CompTIA Security+ — Complete Study Guide
776 concepts across 5 domains, aligned with the CompTIA Security+ SY0-701 exam objectives. Each concept includes a plain-English explanation, real-world examples, and enterprise use cases.
About the Security+ Exam
CompTIA Security+ (SY0-701) is the industry's leading entry-level cybersecurity certification and a baseline for DoD 8570 compliance. It validates the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.
The SY0-701 version, released in November 2023, emphasizes hybrid and multi-cloud environments, automation, and zero trust architecture. It is recommended as a follow-on to CompTIA Network+ and two years of IT experience in a security-focused role.
Exam Tips & Common Traps
- ⚠Authentication vs. Authorization: Authentication confirms identity (who you are). Authorization grants access (what you can do). AAA adds Accounting (logging what you did).
- ⚠Symmetric vs. Asymmetric: Symmetric uses one key (AES, faster). Asymmetric uses a key pair (RSA, slower). TLS uses asymmetric to exchange a symmetric session key.
- ⚠IDS vs. IPS: IDS detects and alerts (passive). IPS detects and blocks (inline/active). NIPS is network-based; HIPS is host-based.
- ⚠Risk = Likelihood × Impact: Residual risk is what remains after controls. Risk acceptance means operating with the residual risk knowingly.
- ⚠Zero trust never implicitly trusts: Even authenticated internal users must verify. The policy engine evaluates every request against signals before granting access.
- ⚠Spear phishing = targeted phishing: Whaling targets C-level executives. Vishing is phone-based. Smishing is SMS-based. All are social engineering tactics.
Study by Domain
Each domain page contains all concepts for that exam section — explanations, examples, use cases, and diagrams.
General Security Concepts
Security controls, CIA triad, zero trust, authentication models, physical security, and deception technologies.
- ✓Control categories (technical, managerial, operational, physical)
- ✓CIA triad and non-repudiation
- ✓AAA framework
- ✓Zero trust architecture and policy engine
- ✓Physical security controls
- ✓Deception technologies (honeypots, honeynets)
Threats, Vulnerabilities, and Mitigations
Threat actors, malware types, social engineering, vulnerability scanning, and attack techniques.
- ✓Nation-state, hacktivist, insider, and unskilled attackers
- ✓Malware: ransomware, trojans, worms, rootkits, spyware
- ✓Social engineering: phishing, vishing, BEC, pretexting
- ✓Vulnerability scanning and penetration testing
- ✓Indicators of compromise (IoC)
- ✓MITRE ATT&CK framework
Security Architecture
Cloud security, network segmentation, cryptography, PKI, and infrastructure security.
- ✓Cloud security models and shared responsibility
- ✓Network segmentation, VLANs, and microsegmentation
- ✓Cryptography: symmetric, asymmetric, hashing
- ✓PKI, certificates, and certificate lifecycle
- ✓Wireless security (WPA3, EAP methods)
- ✓Secure protocols (TLS, SSH, S/MIME, DKIM)
Security Operations
Identity management, endpoint security, SIEM, incident response, and digital forensics.
- ✓Identity and access management (IAM)
- ✓Endpoint detection and response (EDR)
- ✓SIEM and SOAR tools
- ✓Incident response lifecycle
- ✓Digital forensics and chain of custody
- ✓Vulnerability management process
Security Program Management and Oversight
Governance frameworks, risk management, compliance, data privacy, and security auditing.
- ✓Security policies, standards, and procedures
- ✓Risk assessment and risk register
- ✓Compliance frameworks (NIST, ISO 27001, SOC 2, GDPR)
- ✓Data classification and privacy regulations
- ✓Third-party risk management
- ✓Security awareness training programs
Ready to test yourself?
The Tech Cert Prep Security+ app gives you practice quizzes, bookmarking, a study timer, and search across all 776 concepts — organized by the official SY0-701 domains.
Open Security+ Study App — FreeNo account required.