General Security Concepts
Includes key cybersecurity terminology and concepts up front to provide a foundation for security controls discussed throughout the exam.
1.1 – Compare and contrast various types of security controls
1.2 – Summarize fundamental security controls
1.3 – Explain the importance of change management processes and the impact to security
1.4 – Explain the importance of using appropriate cryptographic solutions
Threats, Vulnerabilities & Mitigations
Focuses on responding to common threats, cyberattacks, vulnerabilities, and security incidents and appropriate mitigation techniques to monitor and secure hybrid environments.
2.1 – Compare and contrast common threat actors and motivations
2.2 – Explain common threat vectors and attack surfaces
2.3 – Explain various types of vulnerabilities
2.4 – Given a scenario, analyze indicators of malicious activity
2.5 – Explain the purpose of mitigation techniques used to secure the
enterprise
Security Architecture
Includes security implications of different architecture models, principles of securing enterprise infrastructure, and strategies to protect data.
3.1 – Compare and contrast security implications of different
architecture models
3.2 – Given a scenario, apply security principles to secure enterprise
infrastructure
3.3 – Compare and contrast concepts and strategies to protect data
3.4 – Explain the importance of resilience and recovery in security
architecture
Security Operations
Includes applying and enhancing security and vulnerability management techniques, as well as security implications of proper hardware, software, and data management.
4.1 – Given a scenario, apply common security techniques to
computing resources
4.2 – Explain the security implications of proper hardware, software,
and data asset management
4.3 – Explain various activities associated with vulnerability
management
4.4 – Explain security alerting and monitoring concepts and tools
4.5 – Given a scenario, modify enterprise capabilities to enhance
security
4.6 – Given a scenario, implement and maintain identity and access
management
4.7 – Explain the importance of automation and orchestration related
to secure operations
4.8 – Explain appropriate incident response activities
4.9 – Given a scenario, use data sources to support an investigation
Security Program Management & Oversight
Updated to better reflect the reporting and communication skills required for Security+ job roles relating to governance, risk management, compliance, assessment, and security awareness.
5.1 – Summarize elements of effective security governance
5.2 – Explain elements of the risk management process
5.3 – Explain the processes associated with third-party risk assessment
and management
5.4 – Summarize elements of effective security compliance
5.5 – Explain types and purposes of audits and
assessments