🔐
CompTIA Security+
  • Introduction
  • Threats, Vulnerabilities, and Attacks
    • Threats
      • Threat Actors
      • Malware
    • Vulnerabilities
      • Vulnerability Research
      • Vulnerability Discovery
    • Attacks
      • Social Engineering
      • Password Guessing
      • Services & Applications
      • Wireless Communications
  • Technologies and Tools
    • Devices
      • Network Devices
      • Mobile Devices
    • Tools
    • Analysis
    • Troubleshooting
  • Architecture and Design
    • Frameworks & Guides
    • Cloud & Virtualization
    • Physical Security
    • Network Design
    • System Design
      • System Development
      • Application Security
      • Automation
    • Embedded Systems
  • Identity and Access Management
    • Concepts
    • Services
    • Controls
    • Procedures
  • Risk Management
    • Policy
    • Business Impact Analysis
    • Security Controls
    • Information Security
      • Data Security
      • Privacy
    • Contingency Planning
      • Incident Response
      • Disaster Recovery
      • Continuity of Operations
  • Cryptography and PKI
    • Concepts
    • Algorithms
    • Protocols
      • Authentication Protocols
      • Encryption Protocols
      • Network Service Protocols
    • Public Key Infrastructure
      • Concepts
      • Components
      • Certificates
Powered by GitBook
On this page
  • Before Getting Started
  • Credits

Was this helpful?

Introduction

NextThreats

Last updated 4 years ago

Was this helpful?

Hello world! My name is Victor Fernandez III. These are notes I have developed to help you prepare for the CompTIA Security+ certification. They also represent what I believe should be the baseline body of knowledge for junior cybersecurity professionals. Based on my experience in the field, I strongly recommend investing time learning Information Technology (IT) and networking fundamentals before diving into cybersecurity. If this recommendation speaks to you, I have another for the CompTIA IT Fundamentals certification.

Before Getting Started

Before getting started, I recommend having a broad understanding of the topics below. They provide the backdrop for a lot of material in cybersecurity so spending the time to do a deep-dive on each will make your studying efforts go more smoothly.

  • Electromagnetic Spectrum

    • Copper (volts), radio (signal), fiber optic (photons)

  • Web Applications

    • Graphical user interfaces

    • Databases queries

  • Encapsulation

  • Protocol Data Units

    • Segments

    • Packets

    • Frames

    • Bits

  • TCP/IP

    • DNS, HTTP

    • TCP, UDP

    • IP

    • IEEE 802.3 (Wired Ethernet), IEEE 802.11 (Wireless Ethernet), IEEE 802.15.1 (Bluetooth)

  • Networking Protocols

  • Encryption

  • Hashing

  • Wireless Communication

Credits

Icons made by from

Icons made by from

Icons made by from

Icons made by from

digital notebook
Eucalyp
www.flaticon.com
Freepik
www.flaticon.com
Pixelmeetup
www.flaticon.com
Smashicons
www.flaticon.com