├── Attack Surface.txt ├── CompTIA+Security++701+Acronyms+List.pdf ├── Gap Analysis.txt ├── Hardening Concepts.txt ├── LICENSE ├── Network Access Control.txt ├── Printer+Friendly+Study+Guide.pdf ├── README.md ├── Responsibility Matrix.docx ├── SYO-701+Study+Guide.pdf ├── Section 7; Part 6- Responsibility Matrix.docx ├── Section 10; Part 9 - Hardening Concepts.docx ├── Section 6; Part 5- Attack Surface.docx └── Using Secure Protcols.txt /Attack Surface.txt: -------------------------------------------------------------------------------- 1 | Attack Surface 2 | The network attack surface refer to all the points at which a threat actor could gain access to hosts and services. 3 | 4 | Using the OSI model we can analyze the potential attack surface: 5 | 6 | 7 | 8 | Layer 1/2 - allows the attacker to connect to wall ports or wireless networks and communicate with hosts within the same broadcast domain 9 | 10 | Layer 3 - allows the attacker to obtain a valid network address possibly by spoofing and communicate with hosts in other zones 11 | 12 | Layer 4/7 - allows the attacker to establish connections to TCP or UDP ports and communicate with application layer protocols and services. 13 | 14 | Each layer requires its own type of security controls to prevent, detect, and correct attacks. Provisioning multiple control categories and functions to enforce multiple layers of protection is referred to as defense in depth. 15 | 16 | Security controls deployed to the network perimeter are designed to prevent external hosts from launching attacks at any network layer. The division of the private network into segregated zones is designed to mitigate risks from internal hosts that have either been compromised or that have been connected without authorization. 17 | 18 | 19 | 20 | Typical weaknesses in a network include: 21 | 22 | Single points of failure 23 | 24 | Complex dependencies 25 | 26 | Availability over confidentiality and integrity 27 | 28 | Lack of documentation 29 | 30 | Over dependence on perimeter security 31 | 32 | -------------------------------------------------------------------------------- /CompTIA+Security++701+Acronyms+List.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/CompTIA+Security++701+Acronyms+List.pdf -------------------------------------------------------------------------------- /Gap Analysis.txt: -------------------------------------------------------------------------------- 1 | Gap Analysis 2 | Gap analysis is a process that identifies how an organization's security systems deviate from those required or recommended by a framework. This will be performed when first adopting a framework or when meeting a new industry or legal compliance requirement. The analysis might be repeated every few years to meet compliance requirements or to validate any changes. 3 | 4 | For each section of the framework, a gap analysis report will provide an overall score, a detailed list of missing or poorly configured controls associated with that section, and recommendations for remediation. 5 | 6 | While some or all work involved in gap analysis could be performed by the internal security team, a gap analysis is likely to involve third-party consultants. Frameworks and compliance requirements from regulations and legislation can be complex enough to require a specialist. Advice and feedback from an external party can alert the internal security team to oversights and to new trends and changes in best practice. 7 | 8 | 9 | 10 | -------------------------------------------------------------------------------- /Hardening Concepts.txt: -------------------------------------------------------------------------------- 1 | Hardening Concepts 2 | Network equipment, software, and operating systems use default settings from the developer or manufacturer which attempt to balance ease of use with security. Unfortunately these default configurations are an attractive target for attackers as they usually include well-documented credentials, allow simple passwords and use insecure protocols which increase the likelihood of successful cyberattacks. Therefore, it's crucial to change these default settings to improve security. 3 | 4 | Hardening refers to the methods used to improve a device's security by changing its default configuration. There are various ways for hardening switches, routers, server hardware and operating systems. 5 | 6 | 7 | 8 | Switches & Routers 9 | 10 | Change default credentials 11 | 12 | Disable unnecessary services and interfaces 13 | 14 | Use secure management protocols such as SSH and HTTPS instead of Telnet or HTTP 15 | 16 | Implement Access Control Lists 17 | 18 | Configure port security 19 | 20 | Enforce strong password policies 21 | 22 | Server Hardware and Operating Systems 23 | 24 | Change default credentials 25 | 26 | Disable unnecessary services 27 | 28 | Apply security patches and updates 29 | 30 | Use firewalls and intrusion detection systems 31 | 32 | Secure configuration 33 | 34 | Enable logging and monitoring 35 | 36 | Use Antivirus and Antimalware solutions 37 | 38 | Enforce physical security 39 | 40 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2024 Packt 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /Network Access Control.txt: -------------------------------------------------------------------------------- 1 | Network Access Control 2 | Network Access Control (NAC )not only authenticates users and devices before allowing them access to the network but also checks and enforces compliance with established security policies. By evaluating the operating system version, patch level, antivirus status, or the presence of specific security software, NAC ensures that devices meet a minimum set of security standards before being granted network access. 3 | 4 | NAC also can restrict access based on user profile, device type, location, and other attributes, to ensure users and devices can only access the resources necessary to complete their duties. NAC plays a crucial role in identifying and quarantining suspicious or noncompliant devices. 5 | 6 | NAC and virtual local area networks (VLANs) work together to improve and automate network security. One of the primary ways NAC integrates with VLAN protections is through dynamic VLAN assignment. Dynamic VLAN assignment is a NAC feature that assigns a VLAN to a device based on the user's identity attributes, device type, device location, or health check results. 7 | 8 | Agent vs Agentless Configurations 9 | 10 | NAC can enforce security policies using agent-based and agentless methods. 11 | 12 | In an agent-based approach, a software agent is installed on the devices that connect to the network. This agent communicates with the NAC platform, providing detailed information about the device's status and compliance level. An agent-based NAC implementation can enable features such as automatic remediation, where the NAC agent can perform actions like updating software or disabling specific settings to bring a device into compliance with mandatory security configurations. 13 | 14 | In contrast, an agentless NAC approach uses port-based network access control or network scans to evaluate devices. For example, agentless NAC may use DHCP fingerprinting to identify the type and configuration of a device when it connects, or it might perform a network scan to detect open ports or active services. -------------------------------------------------------------------------------- /Printer+Friendly+Study+Guide.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/Printer+Friendly+Study+Guide.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # CompTIA Security+ (SY0-701) Full Training Guide 2 | CompTIA Security+ (SY0-701) Full Training Guide, by Packt Publishing 3 | -------------------------------------------------------------------------------- /Responsibility Matrix.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/Responsibility Matrix.docx -------------------------------------------------------------------------------- /SYO-701+Study+Guide.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/SYO-701+Study+Guide.pdf -------------------------------------------------------------------------------- /Section 7; Part 6- Responsibility Matrix.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/Section 7; Part 6- Responsibility Matrix.docx -------------------------------------------------------------------------------- /Section 10; Part 9 - Hardening Concepts.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/Section 10; Part 9 - Hardening Concepts.docx -------------------------------------------------------------------------------- /Section 6; Part 5- Attack Surface.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/PacktPublishing/CompTIA-Security-SY0-701-Full-Training-Guide/ec9ad9a2ef5db2a793305ff90ce1c9538b6ed653/Section 6; Part 5- Attack Surface.docx -------------------------------------------------------------------------------- /Using Secure Protcols.txt: -------------------------------------------------------------------------------- 1 | Using Secure Protcols 2 | Secure protocols have places in many parts of your network and infrastructure. Security professionals need to be able to recommend the right protocol for each of the following scenarios: 3 | 4 | Voice and video rely on a number of common protocols. Videoconferencing tools often rely on HTTPS, but secure versions of the Session Initiation Protocol (SIP) and the Real-time Transport Protocol (RTP) exist in the form of SIPS and SRTP, which are also used to ensure that communications traffic remains secure. 5 | 6 | A secure version of the Network Time Protocol (NTP) exists and is called NTS, but NTS has not been widely adopted. Like many other protocols you will learn about in this chapter, NTS relies on TLS. Unlike other protocols, NTS does not protect the time data. Instead, it focuses on authentication to make sure that the time information is from a trusted server and has not been changed in transit. 7 | 8 | Email and web traffic relies on a number of secure options, including HTTPS, IMAPS, POPS, and security protocols like Domain-based Message Authentication Reporting and Conformance (DMARC), DomainKeys Identified Mail (DKIM), and Sender Policy Framework (SPF) as covered earlier in this chapter. 9 | 10 | File Transfer Protocol (FTP) has largely been replaced by a combination of HTTPS file transfers and SFTP or FTPS, depending on organizational preferences and needs. 11 | 12 | Directory services like LDAP can be moved to LDAPS, a secure version of LDAP. 13 | 14 | Remote access technologies—including shell access, which was once accomplished via telnet and is now almost exclusively done via SSH—can also be secured. Microsoft's RDP is encrypted by default, but other remote access tools may use other protocols, including HTTPS, to ensure that their traffic is not exposed. 15 | 16 | Domain name resolution remains a security challenge, with multiple efforts over time that have had limited impact on DNS protocol security, including DNSSEC and DNS reputation lists. 17 | 18 | Routing and switching protocol security can be complex, with protocols like Border Gateway Protocol (BGP) lacking built-in security features. Therefore, attacks such as BGP hijacking attacks and other routing attacks remain possible. Organizations cannot rely on a secure protocol in many cases and need to design around this lack. 19 | 20 | Network address allocation using DHCP does not offer a secure protocol, and network protection against DHCP attacks relies on detection and response rather than a secure protocol. 21 | 22 | Subscription services such as cloud tools and similar services frequently leverage HTTPS but may also provide other secure protocols for their specific use cases. The wide variety of possible subscriptions and types of services means that these services must be assessed individually with an architecture and design review, as well as data flow reviews all being part of best practices to secure subscription service traffic if options are available. 23 | 24 | 25 | 26 | --------------------------------------------------------------------------------