A list of lists important in IT and cybersecurity
…according to CompTIA
Intro
I’m studying to get my CompTIA Security+ certification and this will be a study guide. As I prepare for the exam, I’ll keep adding to this post.
The 5 Main Categories of the CompTIA Security+ exam
- Attacks, Threats and Vulnerabilities
- Architecture & Design
- Implementation
- Operations & Incident Response
- Governance, Risk & Compliance
The OSI (open systems interconnection) model
7. Application layer → Data
6. Presentation layer → Data
5. Session layer → Data
4. Transport Layer → Segments
3. Network layer→ Packets
2. Data link layer → Frames
- Physical layer → Bits
CompTIA Malware Removal Best Practices
- Identify and research malware symptoms.
- Quarantine infected system.
- Disable system restore.
- Remediate infected systems.
- Schedule scans and run updates.
- Enable system restore.
- Educate the end-user.
CompTIA Troubleshooting Process
- ID the problem
- Establish a theory of probable cause
- Test the theory to determine cause
- Establish plan of action & implement the solution
- Verify full system functionality, and if applicable implement preventative measures
- Document findings, actions & outcomes
Network Geography
- PAN — personal area network, around the person, smallest type of network, only a few meters; examples: Bluetooth cellphone to car, USB hard drive to laptop, FireWire video camera to computer
- LAN — local area network, room or building, connects components in a limited distance, length limited by cabling such as 100 meters with CAT 5 cable, consists of Ethernet (IEEE 802.3) or WiFi networks (IEEE 802.11); examples: internal wired or wireless networks
- CAN — campus area network, connects building centric LANs, covers many square miles and buildings; examples: college campuses, business parks, military bases
- MAN — metropolitan area network, connects scattered locations across a city, larger than a CAN but smaller than a WAN, covers up to a 25-mile radius in larger cities; examples: city departments like police departments, community colleges with campuses spread across a county
- WAN — wide area network, connects geographically disparate internal networks, made of leased lines or VPNs tunneled over the internet, across a country or around the world; examples: the Internet, connection of two private networks in New York and Seattle
Network Components
- client
- server
- hub
- WAP
- switch
- router
- media
- WAN link
Incident Response Process
- Preparation
- Identification
- Containment
- Eradicate
- Recovery
- Lessons learned
Security Alert Levels
Level — Condition — Indication
0 — Emergency — The system has become unstable
1 — Alert — A condition should be corrected immediately
2 — Critical — A failure in the system’s primary application requires immediate attention
3 — Error — Something is preventing proper system function
4 — Warning — An error will occur if action is not taken soon
5 — Notice — The events are unusual
6 — Information — Normal operational message that requires no action
7 — Debugging — Useful information for developers
Script File Types
Know and be able to identify the following script file types:
.bat
— a batch file is a series of commands to be run by the Windows operating system stored in a plain text file.py
— a script written in the Python programming language.sh
— like a batch file but used on Linux/Unix operating systems.js
— a script written in the JavaScript programming language.ps1
— this file type is used to run scripts in PowerShell.vbs
— contains lines of code in the Visual Basic programming language which are encoded in a plain text file
… Stay tuned, I’ll be adding to this