SY0-601 - CompTIA Security+: Security Concepts in an Enterprise Environment


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

As a security specialist, you need to be familiar with and apply a range of security concpets related to operating in an enterprise environment. In this course, you'll explore enterprise security factors like change and configuration management, as well as data sovereignty, protection, and loss prevention. You'll learn about hardware security modules, geographical considerations, cloud access security brokers. You'll move on to examine response and recovery controls, SSL/TLS inspection, and site resiliency. Finally, you'll learn about deception and disruption techniques using honeypots, honeyfiles, honeynets, fake telemetry, and DNS sinkholes. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.



Expected Duration (hours)
0.7

Lesson Objectives

SY0-601 - CompTIA Security+: Security Concepts in an Enterprise Environment

  • discover the key concepts covered in this course
  • define change and configuration management concepts like diagram, baseline configurations, standard naming conventions, and documenting the IP schema
  • describe data sovereignty, the conversion and storage of data in binary digital form, and how data is subject to the laws of the located country
  • describe data protection including topics like data loss prevention, masking, and encryption
  • identify key roles of hardware security modules (HSMs) in providing hardened, tamper-resistant devices that generate keys, encrypt and decrypt data, and create and verify digital signatures
  • recognize geographic factors such as jurisdictions, privacy laws, import-export restrictions, and cryptographic regulations
  • describe the on-premises or cloud-based CASB security policy enforcement points that are set between cloud service providers and their consumers
  • compare response and recovery controls as a part of enterprise business continuity and disaster recovery
  • describe SSL/TLS inspection accomplished by next-generation firewalls, WAF solutions, and other cloud-based techniques
  • describe hashing and application programming interfaces and the importance of digitally signing all API calls
  • describe types of site resiliency including hot site, cold site, and warm site solutions
  • define deception and disruption techniques using honeypots, honey tokens, honeyfiles, honeynets, fake telemetry, and DNS sinkholes
  • discover the key concepts covered in this course
  • Course Number:
    it_cssecp2020_05_enus

    Expertise Level
    Intermediate