Comptia Security+ 701
Professor MessorIncident Response Plan, Cyber kill chainSD-WANMTTR, MTBF, RTO, RPONetFlow LogsMTBF, MTTR, RPO, RTOData in-use, at-rest, in-transitDisassociate vs DeauthenticationData Custodians, Data Stewards, Data states, Data subjectData Owners, Data Controllers, Data ProcessorsPublic, Sensitive, Confidential, Restricted, Private, CriticalBluejacking, Bluesnarfing, Bluebugging, Blueborne, BluesmackPrivate,Secret,Legal,ConfidentialCTO,DPO,CIO,CSOAmplified, Volumetric, Reflected, ApplicationResource reuse, Resource exhaustion, Concurrent session usageRootkit, BackdoorWPS,WAP,WPA,WAF,WPA2,WEPMD5, SHA-3, RIPEMD-160,HMACCBC, GCM, ECB, CFBECDHE, ECDSAPFS, PFX, ECBSymmetric, AsymmetricKEKECC, RC4, MD5, SHA-1, IDEA, DHE,DES,AESTKIP, CCMPAH, ESP, IKESMTPS,SRTP,SHTTP,S/MIMEGPG, PGPFDE, EFS, SEDPKCS, PKIBPA, BIA, SLE, and BCPDLP, Radius, IPseckeyloggerCompliance reporting, chain of custody, password vaultsSLE, ARO,ALE,RTOData owner, processor, subject, custodianSCAPSASE, RTOS, CRLPlaybook, Responsibility matrix, audit committee, right-to-auditBlockchain, Secure enclave, HashingCOPE, CYOD, SSO, BYOD802.1X, WPA3, PSK, MFAJournalingRecord & Full-disk encryptionDMARC, SPF ,NAC, DKIMRAS serverVendors, Supplier, Distributors and MSPGap AnalysisDeception and disruption technologyHoneypot, token, file and netNon-RepudiationData masking / Tokenizationopen public ledger vs block chaincryptographic key management (HSM, TPM, Secure Enclave, KMS)Authentication methodsWi-Fi Evolution | 802.11 Standards ExplainedAAA and RADIUS vs TACACS+asdasdPhishing tacticsIDS/IPS - True/False Positive/NegativeLogin PacificExam CompassUdemyCrucial exam