CompTIA Security (SY0-601) Exam Objectives
CompTIA Security (SY0-601) Exam Objectives
Certification Exam
Objectives
EXAM NUMBER: SY0-601
About the Exam
Candidates are encouraged to use this document to help prepare for the CompTIA
Security+ (SY0-601) certification exam. The CompTIA Security+ certification exam will
verify the successful candidate has the knowledge and skills required to:
• Assess the security posture of an enterprise environment and recommend
and implement appropriate security solutions
• Monitor and secure hybrid environments, including cloud, mobile, and IoT
• Operate with an awareness of applicable laws and policies, including
principles of governance, risk, and compliance
• Identify, analyze, and respond to security events and incidents
This is equivalent to two years of hands-on experience working in a security/systems administrator job role.
These content examples are meant to clarify the test objectives and should not be
construed as a comprehensive listing of all the content of this examination.
EXAM DEVELOPMENT
CompTIA exams result from subject matter expert workshops and industry-wide survey
results regarding the skills and knowledge required of an IT professional.
PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of
technologies, processes, or tasks pertaining to each objective may also be included on the exam
although not listed or covered in this objectives document. CompTIA is constantly reviewing the
content of our exams and updating test questions to be sure our exams are current, and the security
of the questions is protected. When necessary, we will publish updated exams based on testing
exam objectives. Please know that all related exam preparation materials will still be valid.
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
TEST DETAILS
Required exam SY0-601
Number of questions Maximum of 90
Types of questions Multiple choice and performance-based
Length of test 90 minutes
Recommended experience • At least 2 years of work experience
in IT systems administration with
a focus on security
• Hands-on technical information security experience
• Broad knowledge of security concepts
Passing score 750 (on a scale of 100–900)
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
1.0 Threats, Attacks and Vulnerabilities
1.1 Compare and contrast different types of social engineering techniques.
• Phishing • Whaling • Influence campaigns
• Smishing • Prepending - Hybrid warfare
• Vishing • Identity fraud - Social media
• Spam • Invoice scams • Principles (reasons for effectiveness)
• Spam over Internet messaging (SPIM) • Credential harvesting - Authority
• Spear phishing • Reconnaissance - Intimidation
• Dumpster diving • Hoax - Consensus
• Shoulder surfing • Impersonation - Scarcity
• Pharming • Watering hole attack - Familiarity
• Tailgating • Typo squatting - Trust
• Eliciting information - Urgency
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
1.0 Attacks, Threats, and Vulnerabilities
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
1.0 Attacks, Threats, and Vulnerabilities
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
1.0 Attacks, Threats, and Vulnerabilities
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
2.0 Architecture and Design
2.1 Explain the importance of security concepts
in an enterprise environment.
• Configuration management • Hardware security module (HSM) • Deception and disruption
- Diagrams • Geographical considerations - Honeypots
- Baseline configuration • Cloud access security broker (CASB) - Honeyfiles
- Standard naming conventions • Response and recovery controls - Honeynets
- Internet protocol (IP) schema • Secure Sockets Layer (SSL)/Transport - Fake telemetry
• Data sovereignty Layer Security (TLS) inspection - DNS sinkhole
• Data protection • Hashing
- Data loss prevention (DLP) • API considerations
- Masking • Site resiliency
- Encryption - Hot site
- At rest - Cold site
- In transit/motion - Warm site
- In processing
- Tokenization
- Rights management
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
2.0 Architecture and Design
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
2.0 Architecture and Design
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
2.0 Architecture and Design
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
3.0 Implementation
3.1 Given a scenario, implement secure protocols.
• Protocols - Hypertext transfer protocol - Email and web
- Domain Name System over SSL/TLS (HTTPS) - File transfer
Security Extension (DNSSEC) - IPSec - Directory services
- SSH - Authentication header (AH)/ - Remote access
- Secure/multipurpose Internet Encapsulated security - Domain name resolution
mail exchanger (S/MIME) payload (ESP) - Routing and switching
- Secure real-time protocol (SRTP) - Tunnel/transport - Network address allocation
- LDAPS - Secure post office protocol (POP)/ - Subscription services
- File transfer protocol, secure (FTPS) Internet message access protocol (IMAP)
- Secured file transfer protocol (SFTP) • Use cases
- Simple Network Management - Voice and video
Protocol, version 3 (SNMPv3) - Time synchronization
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
3.0 Implementation
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
3.0 Implementation
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
3.0 Architecture and Design
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
4.0 Operations and Incident Response
4.1 Given a scenario, use the appropriate tool to
assess organizational security.
• Network reconnaissance and discovery - scanless - OpenSSL
- tracert/traceroute - dnsenum • Packet capture and replay
- nslookup/dig - Nessus - Tcpreplay
- ipconfig/ifconfig - Cuckoo - Tcpdump
- nmap • File manipulation - Wireshark
- ping/pathping - head • Forensics
- hping - tail - dd
- netstat - cat - Memdump
- netcat - grep - WinHex
- IP scanners - chmod - FTK imager
- arp - logger - Autopsy
- route • Shell and script environments • Exploitation frameworks
- curl - SSH • Password crackers
- the harvester - PowerShell • Data sanitization
- sn1per - Python
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
4.0 Operations and Incident Response
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
5.0 Governance, Risk, and Compliance
5.1 Compare and contrast various types of controls.
• Category • Control type - Deterrent
- Managerial - Preventative - Compensating
- Operational - Detective - Physical
- Technical - Corrective
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
5.0 Governance, Risk, and Compliance
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
Security+ (SY0-601) Acronym List
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
ACRONYM DEFINITION
DLP Data Loss Prevention HVAC Heating, Ventilation, Air Conditioning
DMARC Domain Message Authentication IaaS Infrastructure as a Service
Reporting and Conformance ICMP Internet Control Message Protocol
DMZ Demilitarized Zone ICS Industrial Control Systems
DNAT Destination Network Address Transaction IDEA International Data Encryption Algorithm
DNS Domain Name Service (Server) IDF Intermediate Distribution Frame
DNSSEC Domain Name System Security Extensions IdP Identity Provider
DoS Denial of Service IDS Intrusion Detection System
DPO Data Privacy Officer IEEE Institute of Electrical and Electronics Engineers
DRP Disaster Recovery Plan IKE Internet Key Exchange
DSA Digital Signature Algorithm IM Instant Messaging
DSL Digital Subscriber Line IMAP4 Internet Message Access Protocol v4
EAP Extensible Authentication Protocol IoC Indicators of Compromise
ECB Electronic Code Book IoT Internet of Things
ECC Elliptic Curve Cryptography IP Internet Protocol
ECDHE Elliptic Curve Diffie-Hellman Ephemeral IPSec Internet Protocol Security
ECDSA Elliptic Curve Digital Signature Algorithm IR Incident Response
EDR Endpoint Detection and Response IRC Internet Relay Chat
EFS Encrypted File System IRP Incident Response Plan
EOL End of Life ISO International Organization for Standardization
EOS End of Service ISP Internet Service Provider
ERP Enterprise Resource Planning ISSO Information Systems Security Officer
ESN Electronic Serial Number ITCP IT Contingency Plan
ESP Encapsulated Security Payload IV Initialization Vector
FACL File System Access Control List KDC Key Distribution Center
FDE Full Disk Encryption KEK Key Encryption Key
FPGA Field Programmable Gate Array L2TP Layer 2 Tunneling Protocol
FRR False Rejection Rate LAN Local Area Network
FTP File Transfer Protocol LDAP Lightweight Directory Access Protocol
FTPS Secured File Transfer Protocol LEAP Lightweight Extensible Authentication Protocol
GCM Galois Counter Mode MaaS Monitoring as a Service
GDPR General Data Protection Regulation MAC Mandatory Access Control
GPG Gnu Privacy Guard MAC Media Access Control
GPO Group Policy Object MAC Message Authentication Code
GPS Global Positioning System MAM Mobile Application Management
GPU Graphics Processing Unit MAN Metropolitan Area Network
GRE Generic Routing Encapsulation MBR Master Boot Record
HA High Availability MD5 Message Digest 5
HDD Hard Disk Drive MDF Main Distribution Frame
HIDS Host-Based Intrusion Detection System MDM Mobile Device Management
HIPS Host-Based Intrusion Prevention System MFA Multifactor Authentication
HMAC Hashed Message Authentication Code MFD Multi-Function Device
HOTP HMAC based One Time Password MFP Multi-Function Printer
HSM Hardware Security Module MITM Man in the Middle
HTML HyperText Markup Language ML Machine Learning
HTTP Hypertext Transfer Protocol MMS Multimedia Message Service
HTTPS Hypertext Transfer Protocol over SSL/TLS MOA Memorandum of Agreement
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
ACRONYM DEFINITION
MOU Memorandum of Understanding PCI DSS Payment Card Industry Data Security Standard
MPLS Multi-Protocol Label Switching PDU Power Distribution Unit
MSA Measurement Systems Analysis PEAP Protected Extensible Authentication Protocol
MSCHAP Microsoft Challenge Handshake PED Personal Electronic Device
Authentication Protocol PEM Privacy Enhanced Mail
MSP Managed Service Provider PFS Perfect Forward Secrecy
MSSP Managed Security Service Provider PFX Personal Information Exchange
MTBF Mean Time Between Failures PGP Pretty Good Privacy
MTTF Mean Time to Failure PHI Personal Health Information
MTTR Mean Time to Recover PII Personally Identifiable Information
MTU Maximum Transmission Unit PIV Personal Identity Verification
NAC Network Access Control PKCS Public Key Cryptography Standards
NAS Network Attached Storage PKI Public Key Infrastructure
NAT Network Address Translation POP Post Office Protocol
NDA Non-Disclosure Agreement POTS Plain Old Telephone Service
NFC Near Field Communication PPP Point-to-Point Protocol
NFV Network Functions Virtualization PPTP Point-to-Point Tunneling Protocol
NIC Network Interface Card PSK Pre-Shared Key
NIDS Network Based Intrusion Detection System PTZ Pan-Tilt-Zoom
NIPS Network Based Intrusion Prevention System QA Quality Assurance
NIST National Institute of Standards & Technology QoS Quality of Service
NTFS New Technology File System PUP Potentially Unwanted Program
NTLM New Technology LAN Manager RA Recovery Agent
NTP Network Time Protocol RA Registration Authority
OAUTH Open Authorization RACE Research and Development in Advanced
OCSP Online Certificate Status Protocol Communications Technologies in Europe
OID Object Identifier RAD Rapid Application Development
OS Operating System RADIUS Remote Authentication Dial-in User Server
OSI Open Systems Interconnection RAID Redundant Array of Inexpensive Disks
OSINT Open Source Intelligence RAM Random Access Memory
OSPF Open Shortest Path First RAS Remote Access Server
OT Operational Technology RAT Remote Access Trojan
OTA Over The Air RC4 Rivest Cipher version 4
OTG On The Go RCS Rich Communication Services
OVAL Open Vulnerability Assessment Language RFC Request for Comments
OWASP Open Web Application Security Project RFID Radio Frequency Identifier
P12 PKCS #12 RIPEMD RACE Integrity Primitives
P2P Peer to Peer Evaluation Message Digest
PaaS Platform as a Service ROI Return on Investment
PAC Proxy Auto Configuration RPO Recovery Point Objective
PAM Privileged Access Management RSA Rivest, Shamir, & Adleman
PAM Pluggable Authentication Modules RTBH Remote Triggered Black Hole
PAP Password Authentication Protocol RTO Recovery Time Objective
PAT Port Address Translation RTOS Real-Time Operating System
PBKDF2 Password Based Key Derivation Function 2 RTOS Real-Time Operating System
PBX Private Branch Exchange RTP Real-Time Transport Protocol
PCAP Packet Capture S/MIME Secure/Multipurpose Internet Mail Extensions
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
ACRONYM DEFINITION
SaaS Software as a Service of Indicator Information
SAE Simultaneous Authentication of Equals TCP/IP Transmission Control Protocol/Internet Protocol
SAML Security Assertions Markup Language TGT Ticket Granting Ticket
SAN Storage Area Network TKIP Temporal Key Integrity Protocol
SAN Subject Alternative Name TLS Transport Layer Security
SCADA System Control and Data Acquisition TOTP Time-based One Time Password
SCAP Security Content Automation Protocol TPM Trusted Platform Module
SCEP Simple Certificate Enrollment Protocol TSIG Transaction Signature
SDK Software Development Kit TTP Tactics, Techniques, and Procedures
SDLC Software Development Life Cycle UAT User Acceptance Testing
SDLM Software Development Life-cycle Methodology UAV Unmanned Aerial Vehicle
SDN Software Defined Networking UDP User Datagram Protocol
SDV Software Defined Visibility UEFI Unified Extensible Firmware Interface
SED Self-Encrypting Drives UEM Unified Endpoint Management
SEH Structured Exception Handler UPS Uninterruptable Power Supply
SFTP Secured File Transfer Protocol URI Uniform Resource Identifier
SHA Secure Hashing Algorithm URL Universal Resource Locator
SHTTP Secure Hypertext Transfer Protocol USB Universal Serial Bus
SIEM Security Information and Event Management USB OTG USB On The Go
SIM Subscriber Identity Module UTM Unified Threat Management
SIP Session Initiation Protocol UTP Unshielded Twisted Pair
SLA Service Level Agreement VBA Visual Basic
SLE Single Loss Expectancy VDE Virtual Desktop Environment
S/MIME Secure/Multipurpose Internet Mail Exchanger VDI Virtual Desktop Infrastructure
SMS Short Message Service VLAN Virtual Local Area Network
SMTP Simple Mail Transfer Protocol VLSM Variable Length Subnet Masking
SMTPS Simple Mail Transfer Protocol Secure VM Virtual Machine
SNMP Simple Network Management Protocol VoIP Voice over IP
SOAP Simple Object Access Protocol VPC Virtual Private Cloud
SOAR Security Orchestration, Automation, Response VPN Virtual Private Network
SoC System on Chip VTC Video Teleconferencing
SOC Security Operations Center WAF Web Application Firewall
SPF Sender Policy Framework WAP Wireless Access Point
SPIM Spam over Internet Messaging WEP Wired Equivalent Privacy
SQL Structured Query Language WIDS Wireless Intrusion Detection System
SQLi SQL Injection WIPS Wireless Intrusion Prevention System
SRTP Secure Real-Time Protocol WORM Write Once Read Many
SSD Solid State Drive WPA WiFi Protected Access
SSH Secure Shell WPS WiFi Protected Setup
SSL Secure Sockets Layer WTLS Wireless TLS
SSO Single Sign On XaaS Anything as a Service
STIX Structured Threat Information eXchange XML Extensible Markup Language
STP Shielded Twisted Pair XOR Exclusive Or
SWG Secure Web Gateway XSRF Cross-Site Request Forgery
TACACS+ Terminal Access Controller Access Control System XSS Cross-Site Scripting
TAXII Trusted Automated eXchange
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-601)
Security+ Proposed Hardware and Software List
CompTIA has included this sample list of hardware and software to assist
candidates as they prepare for the Security+ exam. This list may also be helpful for
training companies that wish to create a lab component to their training offering.
The bulleted lists below each topic are sample lists and are not exhaustive.
© 2019 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such
programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally.
Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction
or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 007330-Dec2019