Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain One

Subdomain 1.7

Summarize the techniques used in security assessments.

Terms: 26


Threat Hunting

The constant game of cat and mouse; find the attacker before they find you.

Cybersecurity technique designed to detect the presence of threats that have not been discovered by normal security monitoring.

Intelligence Fusion
Threat Feeds
Advisories and Bulletins
Maneuver

Vulnerability Scans

False Positives
False Negatives
Log Reviews
Credentialed vs. Non-Credentialed
Intrusive vs. Non-Intrusive
Application
Web Application
Network
Common Vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS)
Configuration Review

Syslog/Security Information and Event Management (SIEM)

Provides centralized solutions for collecting, analyzing, and managing data from multiple sources.

Review Reports
Packet Capture
Data Inputs
User Behavior Analysis
Sentiment Analysis
Security Monitoring
Log Aggregation
Log Collectors

Security Orchestration, Automation, and Response (SOAR)


Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.