Security+
CompTIA Security+ (SY0-701)
This track is built to help you think like a security practitioner — the way CompTIA expects on the Security+ exam. Not memorization. Not buzzword matching. Applied knowledge across threats, architecture, operations, and governance.
Exam Details
| Detail | Security+ (SY0-701) |
|---|---|
| Format | Up to 90 questions (multiple-choice and performance-based) |
| Time | 90 minutes |
| Cost | $404 USD |
| Passing Score | 750 out of 900 |
| Experience | 2 years in IT administration with security focus (recommended, not required) |
| Renewal | 50 CEUs over 3 years, annual fee $75/year |
What You’ll Learn
- Build a core security foundation beyond memorizing terms and acronyms
- Understand how CompTIA frames questions — applied knowledge, not rote recall
- Work through threat analysis, architecture, and operations scenarios
- Develop structured self-assessment practices to know when you’re exam-ready
Domain 1 — General Security Concepts (12%)
Security controls, CIA triad, AAA, zero trust, change management, and cryptographic solutions.
Section A — Security Foundations
- 1 Security Control Categories and Types
- 2 The CIA Triad and Fundamental Security Concepts
- 3 Authentication, Authorization, and Accounting (AAA)
- ✓ Section A Review: Security Foundations
Section B — Zero Trust and Cryptography
- 4 Zero Trust Architecture
- 5 Change Management and Security Impact
- 6 Cryptographic Concepts and Methods
- 7 Public Key Infrastructure (PKI)
- ✓ Section B Review: Zero Trust and Cryptography
Domain 1 Review
- ★ Capstone Review: GENERAL SECURITY CONCEPTS
Domain 2 — Threats, Vulnerabilities, and Mitigations (22%)
Threat actors, attack surfaces, social engineering, vulnerability categories, malware, attacks, and mitigation techniques.
Section A — Threat Landscape
- 8 Threat Actor Types and Motivations
- 9 Threat Vectors and Attack Surfaces
- 10 Social Engineering Techniques
- ✓ Section A Review: Threat Landscape
Section B — Vulnerability Categories
- 11 Application and Software Vulnerabilities
- 12 Operating System and Hardware Vulnerabilities
- 13 Cloud and Virtualization Vulnerabilities
- 14 Web-Based and Mobile Device Vulnerabilities
- ✓ Section B Review: Vulnerability Categories
Section C — Malicious Activity and Mitigations
- 15 Malware Types and Indicators of Compromise
- 16 Network and Application Attacks
- 17 Cryptographic and Password Attacks
- 18 Mitigation Techniques and Controls
- ✓ Section C Review: Malicious Activity and Mitigations
Domain 2 Review
- ★ Capstone Review: THREATS, VULNERABILITIES, AND MITIGATIONS
Domain 3 — Security Architecture (18%)
Cloud models, virtualization, IoT/ICS, infrastructure as code, design principles, data protection, and resilience.
Section A — Architecture Models
- 19 Cloud and Hybrid Security Models
- 20 Virtualization, Containerization, and Serverless
- 21 IoT, ICS/SCADA, and Embedded Systems
- 22 Infrastructure as Code and Automation
- ✓ Section A Review: Architecture Models
Section B — Data Protection and Resilience
- 23 Security Architecture Design Principles
- 24 Data Protection, Classification, and Privacy
- 25 High Availability and Site Resilience
- 26 Backup Strategies and Disaster Recovery
- ✓ Section B Review: Data Protection and Resilience
Domain 3 Review
- ★ Capstone Review: SECURITY ARCHITECTURE
Domain 4 — Security Operations (28%)
Secure baselines, hardening, wireless, asset management, vulnerability management, monitoring, defense tools, identity, and incident response.
Section A — Secure Computing
- 27 Secure Baselines and Hardening
- 28 Wireless and Mobile Device Security
- 29 Asset Management and Configuration Control
- 30 Vulnerability Management Lifecycle
- ✓ Section A Review: Secure Computing
Section B — Monitoring and Defense
- 31 Security Monitoring and Log Analysis
- 32 Firewalls, IDS/IPS, and Network Security Tools
- 33 Endpoint Detection, Response, and DLP
- ✓ Section B Review: Monitoring and Defense
Section C — Identity and Response
- 34 Identity and Access Management
- 35 Authentication Methods and MFA
- 36 Automation and Orchestration
- 37 Incident Response and Digital Forensics
- ✓ Section C Review: Identity and Response
Domain 4 Review
- ★ Capstone Review: SECURITY OPERATIONS
Domain 5 — Security Program Management and Oversight (20%)
Governance, policies, risk management, third-party risk, compliance, audits, and security awareness programs.
Section A — Governance and Risk
- 38 Security Governance and Policy Frameworks
- 39 Risk Identification and Assessment
- 40 Risk Analysis and Treatment Strategies
- 41 Third-Party and Supply Chain Risk
- ✓ Section A Review: Governance and Risk
Section B — Compliance and Awareness
- 42 Regulatory Compliance and Privacy
- 43 Audits, Assessments, and Penetration Testing
- 44 Security Awareness and Training Programs
- ✓ Section B Review: Compliance and Awareness
Domain 5 Review
- ★ Capstone Review: SECURITY PROGRAM MANAGEMENT AND OVERSIGHT
Career Benefits
- Average salary: $75,000–$110,000 (varies by region and experience)
- DoD 8570.01-M / 8140 compliance for IAT Level II
- Vendor-neutral baseline security certification recognized globally
- Required or preferred for Security Analyst, Systems Administrator, SOC Analyst roles
How It Compares
Security+ is a foundational, vendor-neutral certification covering broad security concepts, while CISSP and CISM target experienced professionals in senior roles. If you're early in your security career or transitioning from IT, Security+ is the ideal starting point. For management-level credentials, consider CISM or CISSP after gaining experience. See the full comparison →
Head-to-head comparisons: Security+ vs CISM · Security+ vs CISSP · Security+ vs CRISC