CompTIA Security+ SY0-601 Course
-
About the course and examAbout the course and certification
-
About the course author
-
Pre-requisites
-
Tools and tips to help you study more efficiently
-
Study techniques that will help you pass
-
What surprised me the most about the exam
-
Domain 1: Threats, Attacks, and VulnerabilitiesAbout threats, attacks, and vulnerabilities
-
1.1: Compare and contrast social engineering techniquesWhat is social engineering?
-
Principles
-
Spam
-
Blocking and Managing Spam
-
Phishing
-
Smishing
-
Vishing
-
Spear Phishing
-
Whaling
-
Impersonation
-
Dumpster diving
-
Shoulder surfing
-
Pharming
-
Tailgating
-
Eliciting information
-
Prepending
-
Identity fraud
-
Invoice scams
-
Credentials harvesting
-
Reconnaissance
-
Hoax
-
Watering hole attack
-
Typo squatting and URL hijacking
-
Influence campaigns
-
Hybrid warfare
-
Practical knowledge check
-
1.2: Analyze potential indicators to determine the type of attackWhat is malware?
-
Malware classification
-
Virus
-
Worms
-
Backdoor
-
Trojans
-
Remote Access Trojan (RAT)
-
Ransomware and Crypto Malware
-
How does ransomware work?
-
Potentially unwanted programs (PUPs)
-
Spyware
-
Adware and Malvertising
-
Keyloggers
-
Fileless malware
-
Logic bombs
-
Rootkit
-
Bots and Botnets
-
Command and control
-
What are password attacks?
-
Plaintext, encrypted, and hashed passwords
-
Brute force
-
Dictionary attacks
-
Spraying attacks
-
Rainbow and hash tables
-
Credential stuffing
-
What are physical attacks?
-
Malicious universal serial bus (USB) cable
-
Malicious flash drive
-
Card cloning
-
Skimming
-
What is adversarial AI and tainted training for ML?
-
Supply-chain attacks
-
Cloud-based vs. on-premises attacks
-
Cryptography concepts
-
Cryptographic attacks
-
Quiz: 1.23 Quizzes
-
1.3: Analyze potential indicators associated with application attacksPrivilege escalation
-
Improper input handling
-
Improper error handling
-
Cross-Site Scripting (XSS)
-
Structured Query Language (SQL) injections
-
Dynamic Link Library (DLL) Injections
-
Lightweight directory access protocol (LDAP) Injections
-
Extensible Markup Language (XML) and XPATH Injections
-
XXE Injections
-
Directory traversal
-
Request forgeries (server-side, client-side, and cross-site)
-
Application Programming Interface (API) attacks
-
Secure Sockets Layer (SSL) stripping
-
Replay attacks (session replays)
-
Pass the hash
-
Race conditions (time of check and time of use)
-
Resource exhaustion
-
Memory leak
-
Pointer/object dereference
-
Integer overflow
-
Buffer overflows
-
Driver manipulation (shimming and refactoring)
-
Quiz 1.32 Quizzes
-
1.4: Analyze potential indicators of network attacksWhat are wireless attacks?
-
Distributed Denial of Service (DDoS)
-
Rogue access point and Evil Twin
-
Bluesnarfing and Bluejacking
-
Disassociation and Jamming
-
Radio Frequency Identifier (RFID) attacks
-
Near Field Communication (NFC)
-
Initialization Vector (IV)
-
Man in the middle (on-path)
-
Man in the browser (on-path browser)
-
What are layer 2 attacks?
-
Address resolution protocol (ARP)
-
Media access control (MAC) flooding
-
MAC cloning
-
What are Domain Name System (DNS) attacks and defenses?
-
Domain hijacking
-
DNS poisoning
-
Universal resource locator (URL) redirection
-
Domain reputation
-
Quiz 1.41 Quiz
-
1.5: Explain threat actors, vectors, and intelligence sourcesWhat are actors and threats?
-
Attributes of actors
-
Vectors
-
Insider threats
-
State actors
-
Hacktivists
-
Script kiddies
-
Hackers (white hat, black hat, gray hat)
-
Criminal syndicates
-
Advanced persistent threats (APTs)
-
Shadow IT
-
Competitors
-
Threat intelligence sources (OSINT and others)
-
Using threat intelligence
-
Research sources
-
Quiz 1.51 Quiz
-
1.6: Security concerns associated with various vulnerabilitiesCloud-based vs. on-premises vulnerabilities
-
Zero-day vulnerabilities
-
Weak configurations
-
Weak encryption, hashing, and digital signatures
-
Third-party risks
-
Improper or weak patch management
-
Legacy platforms
-
Impacts
-
Quiz 1.61 Quiz
-
1.7: Summarizing techniques used in security assessmentsThreat hunting
-
Vulnerability scans
-
Security information and event management (SIEM) and Syslog
-
Security orchestration, automation, and response (SOAR)
-
Quiz 1.71 Quiz
-
1.8: Explaining techniques used in penetration testingImportant pentesting concepts
-
Bug bounties
-
Exercise types (red, blue, white, and purple teams)
-
Passive and active reconnaissance
-
Quiz 1.81 Quiz
-
Domain 2: Architecture and DesignAbout architecture and design
-
2.1: Explaining the importance of security concepts in an enterprise environmentConfiguration management
-
Data sovereignty
-
Data protection
-
Hardware security module (HSM) and Trusted Platform Module (TPM)
-
Geographical considerations
-
Cloud access security broker (CASB)
-
Response and recovery controls
-
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) inspection
-
Hashing
-
API considerations
-
Site resiliency
-
Deception and disruption
-
Quiz 2.11 Quiz
-
2.2: Virtualization and cloud computing conceptsComparing cloud models
-
Cloud service providers
-
Virtualization
-
Containers
-
Microservices and APIs
-
Serverless architecture
-
MSPs and MSSPs
-
On-premises vs. off-premises
-
Edge computing
-
Fog computing
-
Thin client
-
Infrastructure as Code
-
Services integration
-
Resource policies
-
Transit gateway
-
Quiz 2.21 Quiz
-
2.3: Secure application development, deployment, and automation conceptsUnderstanding development environments
-
Automation and scripting
-
Version control
-
Secure coding techniques
-
Open Web Application Security Project (OWASP)
-
Integrity measurement
-
Software diversity
-
Provisioning and deprovisioning
-
Elasticity
-
Scalability
-
Quiz 2.31 Quiz
-
2.4: Authentication and authorization design conceptsImportant authentication and authorization concepts
-
Multifactor authentication (MFA) factors and attributes
-
Quiz: MFA factors and attributes1 Quiz
-
Authentication technologies
-
Biometrics techniques and concepts
-
Authentication, authorization, and accounting (AAA)
-
Cloud vs. on-premises requirements
-
Quiz 2.41 Quiz
-
2.5: Implementing cybersecurity resilienceWhat is redundancy?
-
Disk redundancy (RAID levels)
-
Network redundancy
-
Power redundancy
-
Replication
-
Backup types (full, incremental, differential, and snapshot)
-
Backup types practice scenarios
-
Backup devices and strategies
-
Quiz: Backup types, devices, and strategies1 Quiz
-
Non-persistence
-
Restoration order
-
Diversity
-
Quiz 2.51 Quiz
-
2.6: Security implications of embedded and specialized systemsWhat are embedded systems?
-
System on a Chip (SoC)
-
SCADA and ICS
-
Internet of Things (IoT)
-
Specialized systems
-
VoIP, HVAC, Drones/AVs, MFP, RTOS, Surveillance systems
-
Communication considerations
-
Important constraints
-
2.7: Importance of physical security controlsBollards/barricades, Mantraps, Badges, Alarms, Signage
-
Lighting and fencing
-
Cameras and Closed-circuit television (CCTV)
-
Industrial camouflage
-
Personnel, robots, drones/UAVs
-
Locks
-
Different sensors
-
Fire suppression
-
Protected cable distribution (PCD)
-
Secure areas (air gap, faraday cages, DMZ, etc…)
-
Hot and cold aisles
-
Secure data destruction
-
USB data blocker
-
Quiz 2.71 Quiz
-
2.8: Basics of cryptographyCommon use cases
-
Key length
-
Key stretching
-
Salting, hashing, digital signatures
-
Perfect forward secrecy
-
Elliptic curve cryptography
-
Ephemeral
-
Symmetric vs. asymmetric encryption
-
Key exchange
-
Cipher suites
-
Modes of operation
-
Lightweight cryptography and Homomorphic encryption
-
Steganography
-
Blockchain
-
Quantum and post-quantum
-
Limitations
-
Quizzes 2.82 Quizzes
-
Domain 3: ImplementationAbout implementation
-
3.1: Implement Secure ProtocolsImportant protocols to know and use cases
-
Important email secure protocols
-
IPsec and VPN
-
FTPS, SFTP, SCP
-
DNSSEC
-
SRTP and NTPsec
-
DHCP
-
SNMP and SNMPv3
-
Quiz 3.11 Quiz
-
3.2: Implement host or application security solutionsEndpoint protection
-
Self-encrypting drive (SED), full disk encryption (FDE), and file-level encryption
-
Boot integrity
-
Database and data security
-
Application security
-
Hardening hosts
-
Sandboxing
-
Quiz 3.21 Quiz
-
3.3: Implement secure network designsDNS
-
Load balancing
-
Network segmentation
-
East-West and North-South
-
Jump servers (bastion hosts)
-
Network Address Translation (NAT) Gateway
-
Proxy servers
-
Out-of-band management
-
Quiz 3.3.11 Quiz
-
Virtual Private Networks (VPNs) and IPsec
-
Network Access Control (NAC)
-
Port security
-
Network-based intrusion detection system (NIDS) and network-based intrusion prevention system (NIPS)
-
Firewalls
-
Next-Generation Firewalls
-
Access Control List (ACL) and Security Groups (SGs)
-
Quiz 3.3.21 Quiz
-
Quality of Service (QoS)
-
Implications of IPv6
-
Port scanning and port mirroring
-
File integrity monitors
-
Quiz 3.3.31 Quiz
-
3.4: Install and configure wireless security settingsCryptographic protocols
-
Methods
-
Authentication protocols
-
Installation considerations
-
Quiz 3.41 Quiz
-
3.5: Implement secure mobile solutionsConnection methods and receivers
-
Mobile deployment models
-
Mobile device management (MDM)
-
Mobile devices
-
Enforcement and monitoring
-
Quiz 3.51 Quiz
-
3.6: Apply cybersecurity solutions to the cloudCloud security controls
-
Secure cloud storage
-
Secure cloud networking
-
Secure cloud compute resources
-
Secure cloud solutions
-
Quiz 3.61 Quiz
-
3.7: Implement identity and account management controlsUnderstanding identity
-
Account types to consider
-
Account policies to consider
-
Quiz 3.71 Quiz
-
3.8: Implement authentication and authorization solutionsAuthentication management
-
Authentication protocols and considerations
-
Extensible Authentication Protocol (EAP)
-
RADIUS and TACACS+
-
Kerberos, LDAP, and NTLM
-
Federated Identities
-
Access control schemes
-
Recap notes from this section
-
Quiz 3.81 Quiz
-
3.9: Implement public key infrastructureWhat is public key infrastructure?
-
Types of certificates
-
Certificate formats
-
Important concepts
-
Quiz 3.91 Quiz
-
4.0: Operations and Incident ResponseAbout operations and incident response
-
4.1: Use the appropriate tools to assess organizational securityNetwork reconnaissance and discovery part 1
-
Network reconnaissance and discovery part 2
-
File manipulation
-
Shell and script environments
-
Packet capture and replay
-
Forensics tools
-
Exploitation frameworks
-
Password crackers
-
Data sanitization
-
Quiz 4.11 Quiz
-
4.2: Policies, processes, and procedures for incident responseIncident response plans
-
Incident response process
-
Important exercises
-
Important attack frameworks
-
BCP, COOP, and DRP
-
Incident response team and stakeholder management
-
Retention policies
-
Quiz 4.21 Quiz
-
4.3: Using appropriate data sources to support investigations after an incidentVulnerability scan outputs
-
SIEM dashboards
-
Log files
-
Syslog, rsyslog, syslog-ng
-
Journald and journalctl
-
NXLog
-
Bandwidth and network monitors
-
Important and useful metadata
-
Quiz 4.31 Quiz
-
4.4: Applying mitigation techniques or controls to secure environments during an incidentReconfiguring endpoint security solutions
-
Configuration changes
-
Isolation, containment, and segmentation
-
Secure Orchestration, Automation, and Response (SOAR)
-
Quiz 4.41 Quiz
-
4.5: Key aspects of digital forensicsDocumentation and evidence
-
E-discovery, data recovery, and non-repudiation
-
Integrity and preservation of information
-
Acquisition
-
On-premises vs. cloud
-
Strategic intelligence and counterintelligence
-
Quiz 4.51 Quiz
-
Domain 5: Governance, Risk, and ComplianceAbout governance, risk and compliance
-
5.1: Compare and contrast various types of controlsCategories
-
Control types
-
Quiz 5.11 Quiz
-
5.2: Applicable regulations, standards, or frameworks that impact organizational security postureRegulations, standards, and legislation
-
Key frameworks to know about
-
Benchmarks and secure configuration guides
-
Quiz 5.21 Quiz
-
5.3: Importance of policies to organizational securityPersonnel
-
User training
-
Third-party risk management
-
Data
-
Credential policies
-
Organizational policies
-
Quiz 5.31 Quiz
-
5.4 Risk management processes and conceptsTypes of risks
-
Risk management strategies
-
Risk analysis
-
Disasters
-
Business impact analysis
-
Quiz 5.41 Quiz
-
5.5: Privacy and sensitive data concepts in relation to securityOrganizational consequences of privacy breaches
-
Notifications of breaches
-
Data types
-
Privacy enhancing technologies
-
Roles and responsibilities
-
Quiz 5.51 Quiz
-
Course Recap and Next StepsLooking for the practice exams?
-
Receiving your Certificate of Completion
A large portion of this section is going to be dedicated to explaining various types of malware. The reason for that is that the term malware is used to describe a massive category of threats, and these threats are constantly evolving. Just as soon as companies find ways to detect and prevent a certain type of malware, malicious actors adjust their tactics to evade those detections and preventions.
What’s malware?
What is malware in the first place?
Malware is software designed to do something malicious. The word comes from combining malicious + software.

It’s a massively broad categorization, and so there are all kinds of various types of malware that come in different shapes and sizes, and that are designed for different purposes.
In this section, we’re going to explain a variety of different types of malware, what makes them different, and when or why they’re used by adversaries. We’ll also explain ways of defending yourself, your resources, and your organization’s resources against these malware threats.
As I was creating this lesson and this section of the course, it really dawned on me how malware categorization is all over the place. Even if you ask experts in the industry, you’ll eventually start to get different answers to some of the same questions.
The reason for that is that there are surprisingly few standards that have been created to categorize malware. Or they’re older and no one’s really updated them. So everyone’s kind of doing their own thing, which can make understanding malware and the different types more complicated than it should be.
Types of malware
So let’s start by taking a look at a few malware types, that way we can try and keep a general structure in mind as we study. Keep in mind that many of these also have their own sub-categories:
- Trojans
- Downloader trojans
- Backdoor trojans
- Rootkit trojans
- Remote Access Trojans
- Etc…

- Viruses — that’s right, viruses are a form of malware, even though sometimes people describe them as if they’re separate threats
- Worms
- Crypto-malware
- Ransomware
- Spyware
- Keylogger
- Adware and Malvertising
- Rootkits
- Macro malware
- Browser Hijacker

This is not a fully comprehensive list of all malware, and frankly, I’ve never seen a list that I would consider comprehensive that has been made publicly available. But also, for the exam, these are the main categories that we need to know about.
So all of these categories are technically called malware, because they are designed to do something malicious. That is their purpose for existing.
How does malware spread?
Just like there are different categories of malware, there are also different ways that malware spreads.
Here are some of the most common:
- Drive-by downloads — this happens when malware gets downloaded to your device without you realizing it. Perhaps you’re visiting a website, and as you open the page, the malware automatically downloads. This is usually caused by a browser, application, or operating system vulnerability
- Spam and phishing — while spam and phishing may not always contain malware, it can be used to send fake attachments or link to downloads that do contain malware
- Vulnerabilities — vulnerabilities are security defects in software that can be leveraged by an attacker to deliver and/or execute malware. We already touched on that a little bit, but this could be through a web application vulnerability, a desktop or mobile app vulnerability, or even through an operating system vulnerability
- Software bundles — malware can also sometimes be installed accidentally via software bundles. This happens when you are installing a piece of software from the Internet, and at the same time, that software is installing malware. This is even more common with pirated software
- Malvertising – which uses online advertisements to spread malware
These are techniques that can be used to initially infect a device. Once a device is infected, malware may try to spread to other devices, or it may just stay put and perform more actions on that specific device. It depends on what type of malware it is, and what it’s designed to do.
What are some common signs that your device is infected with malware?
Once a device is infected, it can either take a very long time to realize it (if you ever even realize it), or it can become apparent right away. Usually, if the malware is pervasive, you will notice things like:
- Slower computer or network performance
- Software that was installed on your device and that you don’t remember installing
- Emails that are being sent out from your inbox that you never sent
- Social media posts that are being sent out that you didn’t write
- You may see advertisement on websites that shouldn’t have ads, or even ads popping up while you’re not navigating the web
- Your browser redirects you to websites that you didn’t type in
- Certain operating system functionality gets disabled randomly
- You get locked out of your device, and potentially asked for a ransom
These are some of the most common signs. But keep in mind that well-designed malware or malware that is intended to remain stealthy could very well remain hidden and could continue to remain hidden on your device for a very long time.
Just because you have anti-malware software installed doesn’t mean your device is free of malware.
How can you defend against malware?
Speaking of anti-malware, let’s wrap up this lesson by talking about defenses against malware.
- Anti-malware and anti-viruses – while anti-malware won’t prevent or find all malware, it can help and should be part of your defense strategy. Make sure you keep anti-malware and anti-virus software as up-to-date as you can
- Keep your operating system (and other software) up-to-date – along similar lines, you should keep your OS and applications as up-to-date as you can. People constantly find vulnerabilities in code, so developers have to react by patching those vulnerabilities and sending out updates to their users. If you don’t patch your application when you receive those updates, you’re keeping your device vulnerable to attack
- Be cautious of email attachments or links – attachments could be malware, and links could take you to phishing websites or vulnerable websites that may attempt a drive-by download
- Don’t visit shady websites – especially on work devices, but also in general. Not only do you not know who is running the website and they could have malicious intent, but even if the website itself is legitimate, it may have vulnerabilities that end up getting exploited by someone who is malicious
There are other tactics we can use to defend against malware, but the ones we just talked about will apply to most malware types, and so as we progress through this section, keep them in mind.
Conclusion
Now that we’ve gone through an introduction of malware types, methods of infection, and defenses, let’s complete this lesson and move on to the next!

Responses