Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:19):
And welcome to
technology tap on Professor
Jayrod.
And this episode we're going todiscuss the new security plus
exam.
That's right, you heard me.
The new security plus exam,let's get it.
(00:40):
Hey, everyone, how are wegetting closer to the holidays,
(01:08):
right?
So happy Thanksgiving everyonein the US and Canada.
Does Canada separate?
Nope, I think it was last month.
Anyway, welcome to technologytap.
I'm Professor Jayrod.
For those of you who don't knowme, I am a college professor in
the New York area and I dothese podcasts.
You know I try to do two amonth and it's all based most of
(01:31):
it is based on CompTIA andtechnology at large, and is
Professor Jayrod JROD like thebaseball player, a rod, except
they said Jay instead.
All right, welcome.
And on this week's editionwe're going to talk about the
new security plus.
Can you imagine that?
Right?
(01:52):
I think I did a recording onwhen it went from five to six
and now it is going to six, from601 to 701.
Now, those of you who areprobably studying for the 601,
you probably panic mode saying,oh my god, I missed my window.
Fear not, comptia does.
Let you give out both testsparallel.
(02:14):
So you have up to July 31st ofnext year, of 2024 to take the
601 exam.
That's the good thing aboutCompTIA they run it parallel
because you know you just theexam just came out right and you
know you just, you know you'restill studying for it.
So but that puts pressure onyou which is a good thing to get
(02:36):
the exam done by July 31st ofnext year.
So those of you interested, wecould always do question answer
sessions, right, if you want, ontechnology tab, you just got to
let me know.
Email me at professor Jayrod,that's professor Jay ROD, at
gmailcom, and we can worksomething out.
(02:57):
Always love to interact with myfans and always, always, always
, looking forward to you passingyour CompTIA exams anyway, any,
any of them.
So one of the big things aboutthis CompTIA one, and that I saw
doing some research, is CompTIAinitially did not, even though
they released some objectives,they didn't do the score, they
(03:21):
didn't give a score.
So that speculated some peopleto believe that it was going to
be like the CompTIA CASP examthe CASP, which, if you didn't
know, and I didn't know untilrecently, is pass, fail, right.
So a lot of people thought thatit maybe this exam was going to
be pass failed.
But they, they did release thescore and it's the same.
(03:46):
It's 750 out of 900 in order topass this exam.
So at least they did that.
They didn't change that.
But they, they do say that theyhave done a significant amount
of change in this new one.
They're saying that the numberof exam domains has come down.
You know, actually, let merephrase that the number of
(04:07):
domains have remained the same,but it's fewer objectives from
28 it's 28 objectives used to be35 on the 601 and it's due to
being more focused job role in amaturing industry.
Several the exam domains andexam objectives were reordered
and redained to address andstructural design improvements.
(04:28):
Plus, comptia is constantlyreviewing exam content and
updating questions to ensurewellness and exam integrity.
So they've changed it.
You know that's a seven domains, is is uh, it's pretty
significant.
And about 20 of the examobjectives were updated to
include current trends, thelatest trends in threats,
(04:49):
attacks, vulnerabilities,automation, zero trust, which is
fairly new risk and internet ofthings.
Ot and cloud environments areemphasized, as well as
communication, reporting andteamwork.
Collaboration is key.
That's what I always say.
My classrooms, my students,probably tired of hearing me
saying that, but I always saycollaboration is key in IT.
(05:11):
Right, because in the overallscheme of things right when you
break it down to its essential.
It is really in thecommunication business and you
have to learn how to communicatewith your team.
Hybrid environments the latesttechniques for cybersecurity
professionals working in hybridenvironments that are located in
(05:31):
the cloud or on premise.
Cybersecurity professionalsshould be familiar with both
worlds.
Let's take a look at the domainsthat they have here.
So just to compare it to the601, the 601 had attacks and
threats and vulnerabilities,which was 24% of the exam.
Architecture and design 21%.
(05:52):
Implementation 25%.
Operations and incidentresponse 16%.
And governance, risk andcompliance was at 14%.
So this is the new exam, the701.
It is the general.
Security concepts is 12%.
Threats, vulnerabilities andmitigation is 22%.
(06:12):
Security architecture is 18%.
It looked like that went down.
Security operations it's at 28%.
That looks like it went up.
From what is it?
Security operations?
So operation and incidentresponse so up from 16%.
And security program managementand oversight it's 20%.
Looks like that's one of thenewer concepts that they have,
(06:35):
or they might have merged somedomains here.
So let's take a look at some ofthe objectives here from
CompTIA.
It's very interesting everytime they come up with a new
exam and the new things thatthey do.
People freak out.
I know it's.
I find it to be a little bitfunny.
All right.
So general security conceptsright.
(06:57):
Categories technical managerialoperations still have that.
Control types right, they stillhave that.
Summarized fundamental securityconcepts again CIA still there.
Aaa still there.
Zero trust they implemented See.
Explain the importance ofchange management process right,
(07:18):
change management is well lastfive, 10 years.
Explain the importance of usingappropriate cryptographic
solutions right.
Public key structure encryptionstill asymmetric.
Symmetric tools again.
Tokenization, data masking,hashing, salting, digital
signatures still in there.
All still in there.
(07:38):
Threats, vulnerabilities andmitigation they talk about
threat actors, attributes, theirmotivation, common threat,
attacks and attack services.
They have message base emails,sms and instant message, image
base, voice call, removabledevices.
Talk about unsecured network,both wireless and Bluetooth,
(08:01):
open service fault supply chain.
And talk about again my besttopic, social engineering
fishing, fishing smishing,misinformation, impersonation,
business email, compromisepretext water and hill type was
squatting.
I actually heard of a new saidfishing, fishing smishing.
Smishing is fairly new and itwas another one I forgot.
(08:24):
If I remember, I'll post it,but I know there's another one,
it's a newer one nowadays.
Explained various type ofvulnerabilities to talk about
buffer overflow, race conditions, operating system-based,
web-based, hardware-basedvirtualization Again.
Supply chain, mobile deviceslike siloing and jailbreaking
(08:47):
they talk about giving ascenario.
Analyze indicators of maliciousactivity modwares, physical
attacks, network attack,application attacks,
cryptographic attacks, passwordspraying attacks that's a new
one.
Indicators, account lockouts,block content, impossible travel
that sounds like it's new.
So a lot of new stuff here fromthe other as compared to the
(09:11):
other exam, like you may know it, but they're just putting it on
the exam now.
Explained the purpose ofmitigation techniques used to
secure the enterprise.
Again, least privilege is stillthere application allow, list
isolation, patching,segmentation, decommissioning
that's new Right.
What are you gonna do with theproducts that you already have
(09:32):
been using and you kind of wannaget rid of them because they're
old, right?
Number three securityarchitecture.
Compare and contrast securityimplications of different
architect models.
That architecture andinfrastructure concept cloud,
serverless right.
They have cloud, responsiblematrix, hybrid considerations.
(09:54):
Third party infrastructure hasa code serverless, micro servers
, network infrastructure onpremise, centralized versus
decentralized, containerization,virtualization, internet of
things, embedded system, realtime operating system
considerations availability,costs, responsiveness, patch,
(10:15):
available, inability to patch,power and compute All right.
Next one giving a scenario applysecurity principles to secure
enterprise infrastructures.
They talk about infrastructureconsiderations, device
placements, security zonesattack surface, failure mods,
network compliance, ips, idsstill in there.
(10:37):
Secure communication access,vpn, remote access, tunneling
right, still in there.
Compare and contrast conceptsthrough strategies to protect
data, data types, regulatedtrace secrets, intellectual
properties, data classificationthey still have.
General data considerationsright, data at rest and
transient use methods to securedata, geographic restrictions,
(11:01):
encryption, hashing all that'sstill there.
See, explaining the importanceof resiliency and recovery and
security architecture, highavailability, platform diversity
right, don't use the samecompany for everything.
Multi-cloud system right.
Testing, tabletop exercise,failover simulations, parallel
(11:21):
process right Still there.
You know if you taking.
You know power generators, upsyou know again.
Now listen, let me pause thiswhile we will go over two more.
One of the things I like to sayis, with security plus and I
(11:42):
might get people who say, hey,professor, you're out of your
mind, but I think in a lot ofcases but the security plus is a
little bit easier than networkplus.
Now tell me if you're wrong.
I've had both and I I found thesecurity plus even though the
topic is harder.
I think the exam is easierbecause it's more of Knowing
(12:06):
what they're asking, right.
So it's, if you study Terms anddefinitions and what they do,
you should be able to pass thisexam.
Where network plus it's, youknow, because of, I guess,
subnetting and binary that's inthere and I be addressing it's a
little bit.
I find it's a little bit moredifficult, though.
Subnetting was really difficultfor me in the Beginning.
(12:26):
It's now, of course, easybecause I've been teaching this
for years and the method that Ilearned subnetting is is is
fabulous.
I Feel that network was alittle bit harder Than security
plus, though I did have to.
I felt like I had a study morefor security plus.
I don't know, that's weird, butlet me know if you, if you, if
(12:49):
you agree or disagree, email me,professor J Rod J R O D at
gmailcom.
I want to know what you think.
Did you think that those of youwho have both, do you think
network and security plus Wereharder?
I should do pole Right, thatwould be a good idea.
Do a poll question and, ofcourse, a lot of this stuff.
Scaffold right, like the, the,the biggest mistake that I made,
(13:13):
that I see in in people whowant to change the careers and
I'm all for it.
Believe me, guys, you'll neverget a bigger fan than me as far
as you want to change career toit, regardless of what you were
doing prior, right?
Because I'm I believe that thisis a field that has plenty of
opportunities, plenty ofopportunity for employment,
(13:34):
planning of opportunities foradvancement and plenty of
opportunities to make money.
But I find it interesting thatpeople want to jump right away
to security plus.
I know that's the one that thea lot of people really, really
want, especially the government.
But I find that, if you, thisis, this is not easy, right?
(13:58):
So, if you know, I almost saidtell my students, you know, it's
like jumping in front of theline, right?
You want to jump ahead in frontof the line because you want to
be able to say to yourself hey,this is this one out, it's
gonna make me more money.
And, yes, it's true, you mightget hired for a job Making more
(14:18):
money because you have thesecurity plus.
And a lot of people like to Hirepeople, what I call a taba
roaster, like clean slate, likedidn't work anywhere.
You know, don't have any Othercompanies, bad habits, they take
you and they teach you from theground up their way.
And with security plus, youhave the ability to do that and
(14:39):
that's why it's a it's a goodone to have, but I've you know,
since a lot of this stuffscaffolds, right, using my
education background, and inwhat I mean by scaffold is, if
you take a plus, and you takenetwork plus and you take
security plus, you're gonna seea lot of things that are the
same.
So by the time you get tosecurity plus, there's a lot of
(15:01):
things that you already know,right, and if you're taking one
of these Woukamp classes thatare very, very popular in this
country, you and they don't havetime to explain to you a lot of
this stuff, right?
There's an assumption that youalready know this stuff and they
(15:22):
won't go over the little stuffI Right that you supposedly
learned in order to take upsecurity plus exam, even come
tears, says you have to have twoyears of experience in the
field before you take this exam.
That's what.
That's what they expect, right?
They expect you to have twoyears of experience and this in
(15:42):
this field before Before you yoube able to take it.
So I don't know, it's up to youif you feel like this is, this
is something that you should bedoing.
It's up to you.
I don't, you know, if you wantto jump straight to security
plus, I Don't really recommendit?
(16:03):
I recommend that you take Gothrough the natural a plus that
were plus and then go tosecurity plus and not Jumping
straight to security plusBecause you might find it very
difficult.
You might find it verydifficult, so all right, let's,
let's Continue.
(16:23):
You got security operationsgiven a scenario.
Apply common securitytechniques to computing
resources.
They talk about securitybaseline Hardling targets right
mode device workstation switches, routers right.
How do we do that?
Update right.
Wireless devices installationconsiderations, site surveys,
(16:44):
heat map, mobile solutions, mdmRight.
Use jams Right.
If you're using Apple products,the play model, bring your own
device, which I absolutely hate.
Bless you people who toleratethat.
Wireless security Settings.
They talk about WPA 3 now Right.
(17:07):
Triple a again, radiuscryptology, cryptographic
protocols, authenticationprotocols.
So explain the security,implement, take, implement
implications of proper hardware,software and data asset
management.
So they talk about acquisition,monitoring, asset tracking,
(17:31):
inventory, disposal, thecommissioning, sanitation,
destruction, certification, dataretention, if you need it.
I Explained various activitiesassociated with vulnerability
management, identificationmethods, application security.
They talk about analysis,vulnerability response and
remediation, patching, insurance, segmentation, compensating,
(17:55):
control.
They talk about validation ofremediation, rescanning, orderly
verification.
Explain security alerting andmonitoring concept and tools
Right.
They talk about monitoringcomputer resources, activities.
Tools Right security concept,automation, benchmark agents,
anti-virus, dlp's they talkabout that, giving a scenario.
(18:20):
Modify enterprise capabilitiesto enhance security firewall,
ids, ips, right openingoperating system, security group
policy, sel, se, linux, dns,filtering, email security Giving
a scenario.
Implement and maintain Identityand access management
(18:42):
provisioning, the provisioningof user accounts.
Permission assignment andimplement.
Implement and permissionassignments and implications.
Identity proofing, singlesign-on, which is very popular
now.
Access control, multi-factorauthentication very popular now,
and you in, especially withyour phone.
(19:03):
You know you can't, you can'tbe without your phone nowadays.
Explain the importance ofautomation and orchestration
related to security operationsthat's a new domain.
Use case of automation andscripting, the benefits and
other considerations.
Explain appropriate incidentresponse activities your
processes, training, testing,group cost analysis, digital
(19:26):
forensics Given a scenario.
Use data sources to support andinvestigations log data,
firewalls, logs, your logs,right Data resources, data
sources, vulnerability scans,automation reports, etc.
Security program and oversightsince the last only summarize
(19:47):
elements of effective securitygovernance your guidelines, your
policies, your standards withpassword access control, your
procedures of change management,onboarding and offboarding
Playbooks that's new externalconsiderations regulatory, legal
, industry, local, regional,national, global.
That's new roles andresponsibilities for system and
(20:09):
data.
Explain and that I think that'sthat's expanded.
They had on the last exam alittle bit, a little bit, but I
think that has May have expanded.
Explain the risk, the, theelements of risk management
process risk identification,risk assessments Right.
Ad hoc recurring one time.
(20:29):
A continuous risk analysisstill there, right.
You expose your factor yes.
Single loss expectancy, allthat.
Risk registers, risk tolerance,risk appetite still there, that
hasn't changed, right.
Business impact analysis yourrecovery time objective your
recovery point objective stillin there.
Meantime to repair Hasn'tchanged.
(20:50):
Explain the process associatedwith third-party risk assessment
and management Vendorassessment, vendor selection,
due diligence, conflict ofinterest that's new Right.
Agreement types that has staysthe same, uh.
Vendor monitoringquestionnaires rules of
engagement that's new, right.
(21:12):
They have the oh, this, right.
This vendor assessment.
Right to audit clause, evidenceof internal audits that's new,
good stuff here.
Summarize, uh elements ofeffective security compliance
your compliance reporting,consequences of non-compliance,
compliance monitoring, privacySome of this stuff is new guys.
(21:33):
Look at that.
Uh.
Next 5.5.
Explain the types and purposeof audits and assessments
internal, external penetrationtesting that's still in there,
right, given the scenario.
Implement security practiceYou're phishing.
Behavioral recognition, risky,unexpected, unintentional user
(21:58):
guidelines and training.
And other than that, you havepolicy handbook, situational
awareness, insider threat,password management, removal,
media and cables, socialengineering, uh reporting and
monitoring initial, initial andrecurring development and
execution.
So it looks like, and all thisI got from the CompTIA
(22:22):
objectives.
It's a PDF that they that theygive you, uh, that you can get.
You can find this online.
Uh, they have a hardware andsoftware list.
Now this is new, uh for theSecurity Plus.
Comptia has included thissample list of hardware and
software to assist candidates asthey prepare for the Security
Plus 701, exam.
(22:43):
This list may be helpful,helpful for training companies
that wish to create a labcomponent for their training
offering.
All right, so they haveequipment.
They have a list of equipmenttablet, laptop, web server,
firewall, router, switch, ids,ips, wireless access point,
virtual machines, wow, sparehardware, nic power supplies,
(23:05):
managed switch tools, wi-fianalyzer, network map, per net
flow analyzer software, windowsLinux, kali Linux, packet
capture software, pentestingsoftware and others.
They have a lot more than youknow, than I just mentioned
keyloggers, the ACP service, dnsservice, sample code and then
(23:26):
others, access to cloudenvironment, sample network
documentation and diagram andsample logs that you can use for
your, you know, to practice.
This is a.
This is a good idea.
I may be wrong, but I thinkthat's the first time I got to
look at the other ones, but Ithink this might be the first
time that I see CompTIA do that.
But, as you can see.
(23:48):
And then they have, of course,their acronym list, which is
always helpful for people whoneed a little bit reminder of
what the acronyms are.
There's a couple of pages here.
We'll see anything new thatpops off, but I'm sure they will
be just too.
Just too long to go through.
Anyway, yeah, good luck toanybody who wants to take this
(24:12):
new exam.
Again, it came out November 7thand again you could still take
the 601 and the 701, they'rerunning parallel.
They will run parallel untilJuly 31st of next year.
So if you're studying for your601 now, you're on the clock,
ladies and gentlemen, literallyyou're on the clock and you know
(24:37):
, start doing it.
You know, don't, don't.
You know those of you who'vetaken classes or taken a camp
course or a class, you know nowis the time to start.
You know, start studying andstart planning a date where you
could take the exam.
(24:58):
And that's the key, right?
You should go to Pearson Viewand schedule a day that you want
to take the exam, right?
That way you already have thatmind frame set right.
Oh, I'm going to take the exam,you know February 15th, right,
and then you could always movethe date, right I think it's
(25:19):
only four hours in advance Ifyou're not comfortable or you're
not ready.
But the important thing issetting a date right and you
could still take the 601 and youknow you don't have to worry
and it's still going to be valid, right?
Nobody really asks you.
I think the only people whoreally care about what exams
(25:39):
that you, that you have forSecurity Plus, is really like
trainers, right, if you'retraining for this, if they're
hiring you as a trainer to teachSecurity Plus, a lot of
companies want you to have thenewest exam.
Some they don't care, but a lotof them do.
So if you, if you're taking, ifyou're teaching this, you might
(26:02):
have to take this exam.
But most people don't.
You know, most companies don'tcare.
Security Plus is Security Plus,so they're going to end up
training you anyway.
So you know, if you can takethe first one the 601, if that's
the one that you're going totake, no harm, no foul.
No one's going to tell you like, oh, I'm not going to hire you
(26:24):
because you don't have the 701.
That's not going to happen.
They're still going to hire youbecause they it's still valid.
So again, other than me, noone's going to ask you how you,
what was your score.
So there's that All right.
(26:44):
So that's going to put a bow onon this episode today.
I want to thank everyone forlistening and I want to wish a
very happy Thanksgiving.
Spend some time with yourfamily, eat a lot of turkey and
we'll see you next time.
This has been our Little ChachaProductions, part by Sarah.
(27:21):
Music by Joe Kim.
If you want to reach me, youcan email me at
professorjrodsjrodcom, also onInstagram at professorjrod.