Rover

Rover

Rover is a blog for teaching or storing concepts.

An example text for an image you could add!

Sec+

Replacement Text

Contents

Exam Objectives

SY0-601 Certification Exam Objective Map

Objective Chapter
1.0 Threats, Attacks and Vulnerabilities
1.1 Compare and contrast different types of social engineering techniques Chapter 4
1.2 Given a scenario, analyze potential indicators to determine the type of attack Chapters 3, 4, 7
1.3 Given a scenario, analyze potential indicators associated with application attacks Chapters 6, 12
1.4 Given a scenario, analyze potential indicators associated with network attacks Chapters 3, 12, 13
1.5 Explain different threat actors, vectors, and intelligence sources Chapter 2
1.6 Explain the security concerns associated with various types of vulnerabilities Chapters 1, 2, 5
1.7 Summarize the techniques used in security assessments Chapters 5, 14
1.8 Explain the techniques used in penetration testing Chapter 5
2.0 Architecture and Design
2.1 Explain the importance of security concepts in an enterprise environment Chapters 1, 6, 7, 9, 10, 11, 12
2.2 Summarize virtualization and cloud computing concepts Chapter 10
2.3 Summarize secure application development, deployment, and automation concepts Chapter 6
2.4 Summarize authentication and authorization design concepts Chapter 8
2.5 Given a scenario, implement cybersecurity resilience Chapter 9
2.6 Explain the security implications of embedded and specialized systems Chapter 11
2.7 Explain the importance of physical security controls Chapters 9, 15
2.8 Summarize the basics of cryptographic concepts Chapters 7, 11
3.0 Implementation
3.1 Given a scenario, implement secure protocols Chapter 12
3.2 Given a scenario, implement host or application security solutions Chapters 6, 11
3.3 Given a scenario, implement secure network designs Chapter 12
3.4 Given a scenario, install and configure wireless security settings Chapter 13
3.5 Given a scenario, implement secure mobile solutions Chapter 13
3.6 Given a scenario, apply cybersecurity solutions to the cloud Chapter 10
3.7 Given a scenario, implement identity and account management controls Chapter 8
3.8 Given a scenario, implement authentication and authorization solutions Chapter 8
3.9 Given a scenario, implement public key infrastructure Chapter 7
4.0 Operations and Incident Response
4.1 Given a scenario use the appropriate tool to assess organizational security Chapters 4, 5, 11, 12, 15
4.2 Summarize the importance of policies, processes, and procedures for incident response Chapter 14
4.3 Given an incident, utilize appropriate data sources to support an investigation Chapter 14
4.4 Given an incident, apply mitigation techniques or controls to secure an environment Chapter 14
4.5 Explain the key aspects of digital forensics Chapter 15
5.0 Governance, Risk, and Compliance
5.1 Compare and contrast various types of controls Chapter 1
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture Chapters 10, 16
5.3 Explain the importance of policies to organizational security Chapter 16
5.4 Summarize risk management processes and concepts Chapter 17
5.5 Explain privacy and sensitive data concepts in relation to security Chapter 17

Chapter 1

Categories

Tags