Book Image

CompTIA Security+: SY0-601 Certification Guide - Second Edition

By : Ian Neil
Book Image

CompTIA Security+: SY0-601 Certification Guide - Second Edition

By: Ian Neil

Overview of this book

The CompTIA Security+ certification validates the fundamental knowledge required to perform core security functions and pursue a career in IT security. Authored by Ian Neil, a world-class CompTIA certification trainer, this book is a best-in-class study guide that fully covers the CompTIA Security+ 601 exam objectives. Complete with chapter review questions, realistic mock exams, and worked solutions, this guide will help you master the core concepts to pass the exam the first time you take it. With the help of relevant examples, you'll learn fundamental security concepts from certificates and encryption to identity and access management (IAM). As you progress, you'll delve into the important domains of the exam, including cloud security, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, cryptography, and public key infrastructure (PKI). You can access extra practice materials, including flashcards, performance-based questions, practical labs, mock exams, key terms glossary, and exam tips on the author's website at By the end of this Security+ book, you'll have gained the knowledge and understanding to take the CompTIA exam with confidence.
Table of Contents (24 chapters)
Objectives for the CompTIA Security+ 601 exam
Free Chapter
Section 1: Security Aims and Objectives
Section 2: Monitoring the Security Infrastructure
Section 3: Protecting the Security Environment
Section 4: Mock Tests
Chapter 13: Mock Exam 1
Mock Exam 1 Solutions
Chapter 14: Mock Exam 2
Mock Exam 2 Solutions

Chapter 9: Identifying Threats, Attacks, and Vulnerabilities

As a security professional, you must be fully aware of the different types of attacks that your company could be subjected to. The different attacks range from different types of malware that employees may come across to social engineering, where the attacker will contact them directly and try to exploit their personal vulnerability. We will then look at the different types of threat actors and their characteristics. And finally, we will look at password exploitation and other advanced attacks.

In this chapter, we will cover the following topics:

  • Virus and Malware Attacks
  • Social Engineering Attacks
  • Threat Actors
  • Advanced Attacks
  • Security Concerns with Various Type of Vulnerabilities

Let's start by looking at virus and malware attacks.