Security+ SY0-701 Study Guide

A structured, interactive path to certification success. Master all 5 domains with our comprehensive notes, exam tips, and practical examples.

5 Domains
~15 Hours Reading
Updated for 2025
1

General Security Concepts

12% of Exam

Security controls, CIA triad, cryptography, PKI, authentication, and zero trust.

Exam Objectives

  • 1.1Compare and contrast various types of security controls
  • 1.2Summarize fundamental security concepts
  • 1.3Explain the importance of change management processes and the impact to security
  • 1.4Explain the importance of using appropriate cryptographic solutions

1.1Security Controls

Categories

  • Technical — Firewalls, encryption, access controls
  • Managerial — Policies, procedures, risk management
  • Operational — Day-to-day security audits, monitoring
  • Physical — Locks, biometrics, surveillance cameras

Types

  • Preventive — Stop incidents (firewalls, auth)
  • Deterrent — Discourage attackers (signs, cameras)
  • Detective — Identify incidents (IDS, audits)
  • Corrective — Restore after incident (IR plans, backups)
  • Compensating — Alternative when primary fails
  • Directive — Guidance on compliance (policies, training)

1.2Fundamental Security Concepts

The CIA Triad — Core Security Principles

🔒
Confidentiality
Data only accessible to authorized users. Tools: Encryption, access controls, data masking.
Integrity
Data accuracy and completeness. Tools: Hashing, digital signatures, checksums.
🟢
Availability
Access when needed. Tools: Redundancy, fault tolerance, backups.

AAA Framework

  • Authentication — Verify identity (who you are)
  • Authorization — Grant access (what you can do)
  • Accounting — Track actions for audit
Protocols: RADIUS, TACACS+, Kerberos

Zero Trust Architecture

"Never trust, always verify" — No implicit trust regardless of location.

  • Control Plane: Policy Engine, Administrator, Enforcement Point
  • Data Plane: Implicit trust zones, subject/system access
  • Adaptive Identity: Context-based dynamic authentication

Physical Security

Bollards — Blocks vehicular access
Access Control Vestibule — Controlled building entry
Fencing — Perimeter barrier
Video Surveillance — CCTV monitoring
Sensors — Infrared, pressure, microwave, ultrasonic

Deception Technologies

Honeypot — Decoy system to attract attackers
Honeynet — Network of honeypots
Honeyfile — Fake file to detect unauthorized access
Honeytoken — Decoy credential or data item
Purpose: Detect, monitor, and analyze attacker behavior

1.3Change Management & Security

Change Management Process

  1. 1. Approval Process — Review and authorize changes
  2. 2. Ownership — Assign responsibility
  3. 3. Stakeholders — Identify affected parties
  4. 4. Impact Analysis — Assess security implications
  5. 5. Test Results — Validate before deployment
  6. 6. Backout Plan — Rollback if change fails
  7. 7. Maintenance Window — Scheduled time for changes

Technical Change Management

  • Allow/Deny Lists — Control application execution
  • Restricted Activities — Limit high-risk operations
  • Downtime — Planned outages for maintenance
  • Legacy Applications — Handle outdated systems
  • Dependencies — Track system interdependencies
  • Version Control — Track and manage changes

1.4Cryptographic Solutions

Encryption Types

  • Symmetric — Same key for encrypt/decrypt. Fast. Examples: AES, DES, 3DES
  • Asymmetric — Public/private key pair. Slower. Examples: RSA, ECC, Diffie-Hellman
  • Hashing — One-way transformation. Examples: SHA-256, MD5, bcrypt
Encryption Levels: Full-disk, Partition, File, Volume, Database, Record, Transport

PKI & Certificates

  • CA — Certificate Authority; issues/manages digital certificates
  • CRL — Certificate Revocation List of invalid certs
  • OCSP — Online Certificate Status Protocol (real-time)
  • CSR — Certificate Signing Request to a CA
  • Wildcard — Secures all subdomains of a domain
  • Root of Trust — Trusted anchor for all crypto operations

Hashing & Obfuscation

  • Hashing — Fixed-size output; non-reversible
  • Salting — Random data before hashing; prevents rainbow tables
  • Digital Signatures — Verify authenticity and integrity
  • Key Stretching — Increases effort to crack passwords (bcrypt, PBKDF2)
  • Steganography — Hiding data within other data
  • Tokenization — Replace sensitive data with tokens

Crypto Hardware & Blockchain

  • TPM — Trusted Platform Module; hardware key storage
  • HSM — Hardware Security Module; dedicated crypto hardware
  • Key Escrow — Keys stored by trusted third party
  • Secure Enclave — Isolated hardware for sensitive processing
  • Blockchain — Distributed decentralized ledger; transparent and immutable
  • Non-repudiation — Sender cannot deny sending (digital signatures)