
CompTIA Security+ SY0-701 - Study Guide
This guide covers all five domains of the CompTIA Security+ SY0-701 exam with expanded explanations, practical examples, and key concepts you need to know.
Table of Contents
Exam Overview
Aspect
Details
Domain 1: General Security Concepts (12%)
1.1 Security Controls
The CIA Triad - Foundation of Information Security
Principle
Definition
Example
Opposite (DAD Triad)

Non-Repudiation
Types of Security Controls
Type
Purpose
Examples
Type
Description
Examples
Gap Analysis
1.2 Zero Trust Architecture (ZTA)
Core Principle: "Never Trust, Always Verify"
Key Components:
Component
Function
Zero Trust Pillars:
1.3 Change Management
Change Management Process:
Technical Implications:
1.4 Cryptographic Solutions
Encryption Fundamentals
Term
Definition
Symmetric vs Asymmetric Encryption

Aspect
Symmetric
Asymmetric
Important Algorithms
Algorithm
Key Size
Status
Algorithm
Purpose
Notes
Hashing
Algorithm
Output
Status
Key Concepts
Domain 2: Threats, Vulnerabilities, and Mitigations (22%)
2.1 Threat Actors
Categories of Threat Actors

Actor Type
Motivation
Resources
Sophistication
Advanced Persistent Threats (APTs)
Shadow IT
2.2 Attack Vectors and Surfaces
Common Attack Vectors
Vector
Description
Mitigation
Attack Surface
2.3 Social Engineering Attacks
Types of Social Engineering

Attack
Description
Prevention
Phishing Indicators
TRUST Framework (CISA)
2.4 Malware Types
Categories of Malicious Software
Malware Type
Description
Key Characteristics
Malware Delivery Methods
Honeypots, Honeynets & Honeyfiles
Type
Purpose
2.5 Password Attacks
Types of Password Attacks
Attack
Description
Defense
Password Best Practices
2.6 Application Attacks
Injection Attacks
Attack
Target
Mitigation
Cross-Site Scripting (XSS)
Type
Description
Cross-Site Request Forgery (CSRF/XSRF)
Other Web Attacks
Attack
Description
2.7 Network Attacks
Denial of Service (DoS/DDoS)
Attack Type
Method
Man-in-the-Middle (MITM/On-Path)
Wireless Attacks
Attack
Description
Domain 3: Security Architecture (18%)
3.1 Network Architecture Concepts
Network Segmentation
Concept
Description
Defense in Depth (DiD)
OSI Model Security

Layer
Name
Security Considerations
3.2 Security Appliances
Firewalls
Type
Function
Intrusion Detection/Prevention
System
Function
Proxy Servers
3.3 Cloud Security
Cloud Service Models

Model
You Manage
Provider Manages
Cloud Deployment Models
Model
Description
Cloud Security Concepts
Concept
Description
Responsibility Matrix
Element
IaaS
PaaS
SaaS
3.4 Virtualization Security
Hypervisor Types
Type
Description
Examples
Virtualization Security Concerns
Containers vs VMs
Aspect
Containers
Virtual Machines
3.5 Secure Infrastructure Design
High Availability Concepts
Term
Definition
RAID Levels
RAID
Name
Min Disks
Fault Tolerance
Use Case
Backup Strategies
Type
Description
Speed
Recovery Objectives
Site Types
Site
Readiness
Cost
RTO
3.6 Hardware Security
Secure Boot Process
Hardware Security Modules
Component
Function
Full Disk Encryption
Technology
Platform
Domain 4: Security Operations (28%)
4.1 Identity and Access Management (IAM)
AAA Framework
Component
Function
Authentication Factors

Factor
Type
Examples
Multi-Factor Authentication (MFA)
Authentication Protocols
Protocol
Description
Security
802.1X (Port-Based NAC)
EAP Types
EAP Type
Description
4.2 Access Control Models
Model
Description
Use Case
Privileged Access Management (PAM)
4.3 Network Security Operations
VPN Technologies
Type
Description
IPSec Components
Component
Function
DNS Security
Technology
Function
Email Security
Protocol
Function
4.4 Security Monitoring
SIEM (Security Information and Event Management)
SOC (Security Operations Center)
Role
Responsibility
SOAR (Security Orchestration, Automation, and Response)
Key Security Metrics
Metric
Description
4.5 Incident Response
PICERL Framework (SANS)
Phase
Activities
Incident Response Team
Role
Function
Evidence Handling
Chain of Custody
4.6 Digital Forensics
Forensic Process
Forensic Tools
Tool
Purpose
Image Formats
Format
Description
Legal Concepts
Term
Definition
Domain 5: Security Program Management and Oversight (20%)
5.1 Governance, Risk, and Compliance (GRC)
Security Governance
Element
Description
Common Policies
Policy
Purpose
Security Frameworks
Framework
Focus
Sector
NIST Cybersecurity Framework Core
Function
Focus
5.2 Risk Management
Risk Assessment Process
Risk Terminology
Term
Definition
Risk Treatment Options
Option
Action
Quantitative Risk Analysis
Metric
Formula
Risk Register
5.3 Compliance
Regulatory Requirements
Regulation
Scope
Key GDPR Concepts
Compliance Activities
Activity
Description
5.4 Security Awareness Training
Training Topics
Training Methods
Method
Description
Measuring Effectiveness
5.5 Third-Party Risk Management
Vendor Assessment
Assessment
Purpose
Agreement Types
Agreement
Purpose
SOC Reports
Type
Scope
5.6 Data Security
Data Classification
Level
Description
Examples
Data States
State
Protection
Data Loss Prevention (DLP)
Type
Coverage
Data Roles
Role
Responsibility
Privacy Enhancing Techniques
Technique
Description
Quick Reference: Ports & Protocols
Common Ports to Know
Port
Protocol
Service
Security Notes
Port Ranges
Range
Name
Usage
Quick Reference: Cryptography
Algorithm Summary
Symmetric Encryption (Shared Key)
Algorithm
Key Size
Block Size
Status
Asymmetric Encryption (Public/Private Key)
Algorithm
Key Size
Usage
Hash Functions
Algorithm
Output
Status
Block Cipher Modes
Mode
Description
PKI (Public Key Infrastructure) Components
Component
Function
Certificate Types
Type
Description
Quick Reference: Linux Commands
Essential Security Commands
Command
Purpose
Example
Permission Numbers (chmod)
Number
Permission
Meaning
Quick Reference: Wireless Security
WiFi Standards
Standard
Name
Frequency
Max Speed
Wireless Security Protocols
Protocol
Encryption
Status
Key WPA3 Features
Quick Reference: Acronyms
Must-Know Acronyms
Acronym
Full Name
Study Tips for the Exam
Exam Strategy
High-Priority Topics by Domain
Domain 1 (12%)
Domain 2 (22%)
Domain 3 (18%)
Domain 4 (28%) - LARGEST DOMAIN
Domain 5 (20%)
Resources
PreviousAzure Foundations & Azure FunctionsNextGovernance, Risk, and Compliance (GRC) - Comprehensive Guide
Last updated