- Security+ SY0-601 Certification
- Security+ SY0-601: Passing the Security+ Exam
- Security+ SY0-601: Definitions and Catchwords
- Security+ SY0-601: 1.0 Threats, Attacks, and Vulnerabilities
- Security+ SY0-601: 1.1 Social Engineering Techniques
- Security+ SY0-601: 1.2 Indicators of Attack
- Security+ SY0-601: 1.3 Application Attacks
- Security+ SY0-601: 1.4: Network Attack Indicators
- Security+ SY0-601: 1.5: Threat Actors, Vectors, and Intelligence Sources
- Security+ SY0-601: 1.6: Vulnerabilities
- Security+ SY0-601: 1.7: Security Assessment
- Security+ SY0-601: 1.8: Penetration Testing
- Security+ SY0-601: 2.0 Architecture and Design
- Security+ SY0-601: 2.1 Enterprise Security Architecture
- Security+ SY0-601: 2.2: Virtualization and Cloud Security
- Security+ SY0-601: 2.3: Secure Application Development, Deployment and Automation
- Security+ SY0-601: 2.4: Authentication and Authorization
- Security+ SY0-601: 2.5: Implementing Cybersecurity Resilience
- Security+ SY0-601: 2.6: Embedded and Specialized Systems
- Security+ SY0-601: 2.7: Physical Security Controls
- Security+ SY0-601: 2.8: Cryptography
- Security+ SY0-601: 3.0: Implementation
- Security+ SY0-601: 3.1 Secure Protocols
- Security+ SY0-601: 3.2: Host and Application Security
- Security+ SY0-601: 3.3: Secure Network Design
- Security+ SY0-601: 3.4: Wi-Fi Security
- Security+ SY0-601: 3.5: Secure Mobile Solutions
- Security+ SY0-601: 3.6: Cybersecurity Solutions in the Cloud
- Security+ SY0-601: 3.7: Identity and Account Management Controls
- Security+ SY0-601: 3.8: Implement Authentication and Authorization Solutions
- Security+ SY0-601: 3.9: Public Key Infrastructure
- Security+ SY0-601: 4.0: Operations and Incident Response
- Security+ SY0-601: 4.1: Tools to Assess Organizational Security
- Security+ SY0-601: 4.2: Policies, Processes, and Procedures for Incident Response
- Security+ SY0-601: 4.3: Appropriate Data Sources for Investigation
- Security+ SY0-601: 4.4: Mitigation Techniques
- Security+ SY0-601: 4.5: Digital Forensics
- Security+ SY0-601: 5.0: Governance, Risk, and Compliance
- Security+ SY0-601: 5.1: Types of Controls
- Security+ SY0-601: 5.2 Regulations, Standards, and Frameworks
- Security+ SY0-601: 5.3: Policies and Organizational Security
- Security+ SY0-601: 5.4: Risk Management Processes and Concepts
- Security+ SY0-601: 5.5: Privacy and Sensitive Data
- Security+: My Favorite Free Tools
- Security+ : Sample Questions
- Passing the CompTIA Exams
- Understanding CompTIA Objectives Using Bloom’s Taxonomy
My Favorite Free Security Tools | ||||
Command-Line Tools | ||||
Command
|
Description
|
Example
|
Explanation
|
|
Linux
|
||||
Queries DNS servers for host name/IP address mappings. | dig dig <hostname> |
Queries hosts listed in /etc/resolve.conf or the host named. | ||
Requests a response from a host. Keeps going until Ctrl-C. | ping google.com | Asks the computer handling requests for google.com for a response. | ||
Insecure unencripted terminal client program | telnet host.foolish.com | Attempts to open telnet communications with host.foolish.com. This service should be disabled. | ||
Requests a detailed path from your PC to the destination. | traceroute google.com | Produces a report of the path your request takes, including IP addresses and response times. | ||
Queries DNS information about the owner and host of a domain. | whois XXX | |||
dd
|
A disk duplication utility useful in forensics | dd /dev/hda0 /dev/hdb0 | ||
nmap
|
The classic network mapper. Consider carefully who you map. | nmap arrestme.com | ||
Windows
|
||||
Reports the current Address Resolution Protocol cache | arp -a | Shows all current IP to MAC mappings. | ||
Reports established ports and connections being monitored | netstat -ano | Returns a 5-column report of IP addresses and port numbers. | ||
Queries DNS servers for host name/IP address mappings. | ||||
Requests a response from a host. Cycles 4 times. | ping google.com | Asks the computer handling requests for google.com for a response. | ||
Insecure unencripted terminal client program | telnet host.foolish.com | Attempts to open telnet communications with host.foolish.com. This service should be disabled. | ||
Requests a detailed path from your PC to the destination. | tracert google.com | Produces a report of the path your request takes, including IP addresses and response times. | ||
GUI Tools | ||||
Application
|
Description
|
Functions
|
Platform
|
Related
|
Remote security scanner for Linux, BSD, Solaris, and other Unix. Over 1200 remote security checks, and also uses plug-ins. Multi-format reports are available. And it even suggests solutions! | Security Check | Unix: Linux BSD Solaris Others |
||
A network protocol analyzer for Unix and Windows. Capture packets from a network or read a capture file on disk. View summary and detail information for each packet. Filter the info display and view a reconstructed stream of a TCP session. | Unix Windows |
A command-line version called tethereal (included) | ||
“Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable ‘back-end’ tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.” –www.securityfocus.com | Network Exploration | Unix, Windows | ||
Or follow the… | … vulnerability scanner page on Darknet at… | http://www.darknet.org.uk/tag/vulnerability-scanner/ |
Find wireless access points: NetStumbler
Find patterns in packets on the network: ngrep – network grep