Security+ (SY0-701) Study Path¶
What This Study Path Provides¶
This guide maps every CompTIA Security+ SY0-701 exam domain directly to Nexus SecOps content so you can prepare for the certification using hands-on, defense-oriented material. For each domain you will find:
- Chapter mappings with specific section references
- Key topics aligned to exam objectives
- 10 original practice questions per domain (50 total) with detailed explanations
- Lab, MicroSim, and scenario cross-references for hands-on reinforcement
- An 8-week study calendar designed for working professionals
How to use this guide
Work through one domain at a time. Read the mapped chapters, complete the linked labs and scenarios, then test yourself with the practice questions. Use the expandable answers to review explanations and identify gaps.
Exam Overview¶
| Detail | Value |
|---|---|
| Exam Code | SY0-701 |
| Number of Questions | Up to 90 |
| Duration | 90 minutes |
| Passing Score | 750 / 900 |
| Question Types | Multiple choice + performance-based |
| Cost | ~$392 USD |
| Validity | 3 years (CE credits or retake) |
| Prerequisites | None required (Network+ recommended) |
| DoD 8570 | IAT Level II baseline |
| Domain | Weight |
|---|---|
| 1. General Security Concepts | 12% |
| 2. Threats, Vulnerabilities, and Mitigations | 22% |
| 3. Security Architecture | 18% |
| 4. Security Operations | 28% |
| 5. Security Program Management and Oversight | 20% |
Domain 1: General Security Concepts (12%)¶
Mapped Chapters¶
| Chapter | Title | Key Sections |
|---|---|---|
| Ch01 | Introduction to SOC & AI | SOC structure, analyst tiers, MITRE ATT&CK fundamentals |
| Ch02 | Telemetry & Log Sources | Security data types, log integrity, audit trails |
| Ch03 | Data Modeling & Normalization | Data classification, schema enforcement, information lifecycle |
| Ch13 | Security Governance, Privacy & Risk | Policy hierarchy, governance frameworks, privacy principles |
| Ch15 | Resilience & Tabletop Exercises | Business continuity, resilience planning, lessons learned |
Key Topics¶
- Security controls -- preventive, detective, corrective, deterrent, compensating, and physical controls mapped across administrative, technical, and operational categories.
- CIA triad and AAA -- confidentiality, integrity, availability, authentication, authorization, and accounting applied to SOC telemetry and access management.
- Zero Trust principles -- "never trust, always verify" model, implicit deny, micro-segmentation basics (see also Ch39).
- Threat actors and motivations -- nation-state, hacktivist, organized crime, insider threat, script kiddie, and their TTPs mapped to MITRE ATT&CK.
- Gap analysis and security assessments -- control evaluation, risk identification, and maturity measurement.
Related Labs & Scenarios¶
- Lab 01: Synthetic Alert Triage -- hands-on SOC fundamentals
- Lab 09: Purple Team Exercise -- offensive/defensive collaboration
- Lab 29: Zero Trust Architecture -- Zero Trust controls
Practice Questions -- Domain 1¶
Question 1: Which type of security control is designed to discourage a threat actor from attempting an attack in the first place?
A) Detective B) Corrective C) Deterrent D) Compensating
Answer
Correct Answer: C) Deterrent
Explanation: Deterrent controls aim to discourage attacks before they happen. Examples include security cameras (visible), warning banners, security lighting, and acceptable use policies. Detective controls identify attacks in progress, corrective controls fix damage after an attack, and compensating controls provide alternative protection when primary controls are impractical.
Reference: Chapter 1 -- Security Control Types
Question 2: An organization requires all employees to use smart cards and PINs to access the server room. Which security concept does this implement?
A) Single-factor authentication B) Multi-factor authentication C) Role-based access control D) Discretionary access control
Answer
Correct Answer: B) Multi-factor authentication
Explanation: Smart card (something you have) combined with PIN (something you know) constitutes two different authentication factors. MFA requires at least two factors from different categories: something you know, something you have, something you are, or somewhere you are. Using two passwords would be multi-step but not multi-factor since both are "something you know."
Question 3: Which principle states that users should only be given the minimum permissions necessary to perform their job functions?
A) Separation of duties B) Need to know C) Least privilege D) Defense in depth
Answer
Correct Answer: C) Least privilege
Explanation: The principle of least privilege restricts user access rights to the bare minimum needed for their role. Need to know is related but specifically limits access to information. Separation of duties ensures no single person can complete a critical process alone. Defense in depth uses multiple layers of controls rather than limiting individual permissions.
Question 4: A SOC analyst notices that firewall logs, endpoint detection alerts, and authentication events are all stored in different formats. Which process would standardize these into a common schema?
A) Data masking B) Log normalization C) Data deduplication D) Event correlation
Answer
Correct Answer: B) Log normalization
Explanation: Log normalization converts disparate log formats into a common schema (such as ECS, CIM, or CEF) so analysts and detection rules can process events consistently. Data masking obscures sensitive fields, deduplication removes repeated records, and correlation links related events into incidents -- but none of those standardize the format itself.
Reference: Chapter 3 -- Data Modeling and Normalization
Question 5: Which element of the CIA triad is MOST directly compromised when an attacker modifies database records without authorization?
A) Confidentiality B) Integrity C) Availability D) Non-repudiation
Answer
Correct Answer: B) Integrity
Explanation: Integrity ensures that data has not been altered by unauthorized parties. Unauthorized modification of database records is a direct integrity violation. Confidentiality addresses unauthorized disclosure, availability addresses denial of service, and non-repudiation (not part of CIA) proves a party performed an action.
Reference: Chapter 1 -- Security Fundamentals
Question 6: A security team conducts a tabletop exercise simulating a ransomware incident. What type of control is this exercise considered?
A) Technical detective B) Administrative preventive C) Physical deterrent D) Operational corrective
Answer
Correct Answer: B) Administrative preventive
Explanation: Tabletop exercises are administrative (policy/procedure-based) and preventive because they prepare teams to handle incidents more effectively before they occur. They identify gaps in response plans and improve readiness. While they may reveal detective or corrective control weaknesses, the exercise itself is an administrative preventive measure.
Question 7: In a Zero Trust architecture, which statement BEST describes the default security posture?
A) Internal users are trusted; external users are verified B) All traffic is denied unless explicitly allowed regardless of location C) Trust is established by network zone membership D) VPN users inherit full network access
Answer
Correct Answer: B) All traffic is denied unless explicitly allowed regardless of location
Explanation: Zero Trust eliminates implicit trust based on network location. Every access request -- whether from inside or outside the corporate perimeter -- must be authenticated, authorized, and continuously validated. Options A, C, and D all describe perimeter-based trust models that Zero Trust explicitly rejects.
Reference: Chapter 39 -- Zero Trust Implementation
Question 8: A company classifies data as Public, Internal, Confidential, and Restricted. A marketing brochure available on the website would receive which classification?
A) Restricted B) Confidential C) Internal D) Public
Answer
Correct Answer: D) Public
Explanation: Data classification labels indicate the sensitivity and required handling. A marketing brochure intended for external distribution on the company website is Public data -- no harm results from its disclosure. Restricted data (e.g., PII, trade secrets) requires the highest protection, Confidential is sensitive but less critical, and Internal is for employee-only material.
Question 9: Which MITRE ATT&CK component describes the specific method a threat actor uses to achieve a tactic?
A) Tactic B) Technique C) Procedure D) Campaign
Answer
Correct Answer: B) Technique
Explanation: In MITRE ATT&CK, tactics represent the adversary's goal (the "why"), techniques describe how the adversary achieves that goal (the "how"), and procedures are specific implementations of techniques observed in the wild. Campaigns describe coordinated sets of intrusion activity. The hierarchy is: Tactic > Technique > Sub-technique > Procedure.
Reference: Chapter 1 -- MITRE ATT&CK Framework
Question 10: An organization discovers that a former contractor still has VPN access two months after their contract ended. Which security process failed?
A) Onboarding B) Account provisioning C) Offboarding D) Access recertification
Answer
Correct Answer: C) Offboarding
Explanation: Offboarding is the process of revoking all access when an employee or contractor leaves the organization. This includes disabling accounts, revoking VPN credentials, retrieving equipment, and removing from distribution lists. While access recertification reviews could also catch this, the root failure is the offboarding process that should have immediately revoked access upon contract termination.
Domain 2: Threats, Vulnerabilities, and Mitigations (22%)¶
Mapped Chapters¶
| Chapter | Title | Key Sections |
|---|---|---|
| Ch22 | Threat Actor Encyclopedia | APT groups, MITRE ATT&CK mapping, TTPs, detection opportunities |
| Ch23 | Ransomware Deep Dive | Kill chain analysis, double extortion, detection engineering |
| Ch24 | Supply Chain Attacks | SolarWinds, XZ Utils, MOVEit, SLSA/SBOM frameworks |
| Ch25 | Social Engineering | Phishing, vishing, pretexting, awareness programs |
| Ch26 | Insider Threats | Behavioral indicators, UEBA, investigation frameworks |
| Ch29 | Vulnerability Management | CVSS, EPSS, risk-based prioritization, patch management |
| Ch53 | Zero-Day Response | CVE lifecycle, CVSS v4, responsible disclosure, virtual patching |
Key Topics¶
- Threat actor types -- nation-state APTs, organized crime, hacktivists, insider threats, and their motivations (financial, espionage, disruption, ideology).
- Attack vectors -- phishing, watering hole, supply chain compromise, removable media, wireless, and direct access attacks.
- Vulnerability types -- software flaws (buffer overflow, injection, XSS), misconfigurations, default credentials, zero-day, and third-party library risks.
- Malware categories -- ransomware, trojans, rootkits, fileless malware, RATs, worms, logic bombs, and cryptominers.
- Mitigation techniques -- patching, network segmentation, input validation, application allow-listing, endpoint hardening, and security awareness training.
Related Labs & Scenarios¶
- Lab 07: Malware Triage -- malware classification and indicators
- Lab 10: Threat Hunt -- proactive threat identification
- Lab 30: Vulnerability Triage -- CVSS scoring and prioritization
- Lab 23: YARA/Sigma Threat Hunting -- detection rule creation
Practice Questions -- Domain 2¶
Question 1: A user receives an email that appears to come from the CEO, urgently requesting a wire transfer to a new vendor. The email address is CEO@company-secure.com instead of CEO@company.com. What type of attack is this?
A) Spear phishing B) Whaling C) Business email compromise (BEC) D) Vishing
Answer
Correct Answer: C) Business email compromise (BEC)
Explanation: BEC attacks impersonate executives or trusted parties to trick employees into transferring funds or disclosing sensitive data. While this is also a form of spear phishing (targeted) and whaling (targeting high-value individuals), the use of a look-alike domain to impersonate the CEO for financial fraud is the hallmark of BEC. Vishing uses voice calls rather than email.
Question 2: An attacker compromises a software vendor's build server and injects malicious code into a legitimate software update. Thousands of customers install the tainted update. What type of attack is this?
A) Watering hole attack B) Supply chain attack C) Drive-by download D) Typosquatting
Answer
Correct Answer: B) Supply chain attack
Explanation: Supply chain attacks compromise a trusted vendor, supplier, or third-party component to reach the vendor's downstream customers. The SolarWinds Orion compromise (2020) is the canonical example: attackers injected malicious code into the build pipeline, and the trojanized update was distributed to approximately 18,000 organizations. Watering hole attacks compromise websites that targets visit, not vendor build pipelines.
Reference: Chapter 24 -- Supply Chain Attacks
Question 3: Which vulnerability scoring system uses factors like Attack Vector, Attack Complexity, Privileges Required, and User Interaction to calculate a severity score from 0.0 to 10.0?
A) EPSS B) CVSS C) CWE D) CVE
Answer
Correct Answer: B) CVSS
Explanation: The Common Vulnerability Scoring System (CVSS) evaluates vulnerabilities on a 0.0-10.0 scale using Base, Temporal, and Environmental metric groups. Base metrics include Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope, and CIA impact. EPSS predicts exploitation probability, CWE categorizes weakness types, and CVE provides unique identifiers for vulnerabilities.
Question 4: An organization discovers that a disgruntled employee has been exfiltrating customer data to a personal cloud storage account for three months. Which threat category does this represent?
A) Advanced persistent threat B) Insider threat C) Hacktivist D) Organized crime
Answer
Correct Answer: B) Insider threat
Explanation: Insider threats originate from individuals who have legitimate access to organizational resources -- employees, contractors, or business partners. This scenario describes a malicious insider motivated by grievance. Key indicators include unusual data access patterns, use of personal storage services, and after-hours activity. UEBA (User and Entity Behavior Analytics) is a primary detection mechanism for this threat type.
Reference: Chapter 26 -- Insider Threats
Question 5: Ransomware operators exfiltrate 50 GB of data before encrypting the victim's systems, then threaten to publish the data unless payment is received. What is this technique called?
A) Cryptojacking B) Double extortion C) Credential stuffing D) Data diddling
Answer
Correct Answer: B) Double extortion
Explanation: Double extortion combines traditional ransomware encryption with data theft and the threat of public exposure. Victims face two pressures: pay to decrypt their data AND pay to prevent publication of stolen data. This technique was pioneered by the Maze ransomware group and has become standard practice. Some groups have escalated to triple extortion, adding DDoS threats or contacting customers directly.
Reference: Chapter 23 -- Ransomware Deep Dive
Question 6: A security scanner reports a critical vulnerability (CVSS 9.8) in a library used by an internal application. EPSS shows a 2% probability of exploitation. The application is only accessible from the internal network. How should the team prioritize this?
A) Patch immediately -- CVSS 9.8 is critical regardless of context B) Deprioritize completely -- 2% EPSS means it will not be exploited C) Apply risk-based prioritization considering CVSS, EPSS, asset exposure, and business impact D) Accept the risk since the application is internal
Answer
Correct Answer: C) Apply risk-based prioritization considering CVSS, EPSS, asset exposure, and business impact
Explanation: Risk-based vulnerability management considers multiple factors: CVSS severity, EPSS exploitation likelihood, asset criticality, network exposure, and compensating controls. While the CVSS score is high, the low EPSS and internal-only exposure reduce the effective risk. Neither CVSS alone nor EPSS alone tells the complete story. The team should still plan remediation but may not need to treat it as an emergency.
Reference: Chapter 29 -- Risk-Based Vulnerability Prioritization
Question 7: Which type of malware operates entirely in memory, leaves no files on disk, and often abuses legitimate system tools like PowerShell?
A) Rootkit B) Worm C) Fileless malware D) Trojan
Answer
Correct Answer: C) Fileless malware
Explanation: Fileless malware resides exclusively in memory and leverages legitimate system tools (Living off the Land Binaries, or LOLBins) such as PowerShell, WMI, and mshta.exe. Because nothing is written to disk, traditional signature-based antivirus cannot detect it. Detection requires behavioral analysis, script block logging, AMSI integration, and memory-based endpoint detection.
Reference: Chapter 22 -- Threat Actor TTPs and Fileless Techniques
Question 8: A newly discovered vulnerability has no vendor patch available. The security team implements a WAF rule to block exploit attempts while waiting for a fix. What is this mitigation called?
A) Hot fix B) Virtual patching C) Compensating control D) Both B and C
Answer
Correct Answer: D) Both B and C
Explanation: Virtual patching uses WAF rules, IPS signatures, or other network-based controls to block exploitation of a known vulnerability without modifying the vulnerable application. It is also a compensating control because it provides alternative protection when the primary control (vendor patch) is unavailable. Virtual patching is a critical strategy for zero-day response while vendors develop official fixes.
Reference: Chapter 53 -- Zero-Day Response and Virtual Patching
Question 9: An attacker sends a link to https://paypa1.com (with a numeral '1' instead of the letter 'l') in a phishing email. What technique is being used?
A) URL redirection B) Typosquatting C) DNS poisoning D) Pharming
Answer
Correct Answer: B) Typosquatting
Explanation: Typosquatting (also called URL hijacking) registers domain names that are visually similar to legitimate domains, exploiting common typing mistakes or character substitutions. Using "paypa1.com" (numeral 1) instead of "paypal.com" (letter l) is a classic homoglyph attack. URL redirection sends users from a legitimate URL to a malicious one, DNS poisoning corrupts DNS responses, and pharming redirects traffic at the DNS level.
Reference: Chapter 25 -- Social Engineering Techniques
Question 10: Which framework provides a standardized way to document the software components included in an application, helping organizations identify vulnerable dependencies?
A) STIX B) SBOM C) SOAR D) SIEM
Answer
Correct Answer: B) SBOM
Explanation: A Software Bill of Materials (SBOM) is a formal, machine-readable inventory of all components, libraries, and dependencies in a software product. SBOMs enable rapid identification of affected systems when a vulnerability is discovered in a component (e.g., Log4Shell). STIX is a threat intelligence format, SOAR is a security orchestration platform, and SIEM is a log aggregation and correlation system.
Reference: Chapter 24 -- Supply Chain Attacks and SBOM
Domain 3: Security Architecture (18%)¶
Mapped Chapters¶
| Chapter | Title | Key Sections |
|---|---|---|
| Ch31 | Network Security Architecture | Zero Trust, NGFW, IDS/IPS, micro-segmentation, SASE, DNS security |
| Ch32 | Applied Cryptography | Symmetric/asymmetric algorithms, PKI, TLS, certificate management |
| Ch33 | Identity & Access Security | Active Directory, PAM, MFA, SSO, federation, RBAC |
| Ch34 | Mobile & IoT Security | MDM/UEM, IoT architecture, OT convergence |
| Ch39 | Zero Trust Implementation | NIST SP 800-207, CISA maturity model, deployment roadmap |
Key Topics¶
- Network architecture models -- perimeter-based vs. Zero Trust, DMZ design, network segmentation, micro-segmentation, and software-defined networking.
- Cryptographic concepts -- symmetric (AES, ChaCha20) vs. asymmetric (RSA, ECC), hashing (SHA-256), digital signatures, PKI, and certificate lifecycle.
- Identity and access management -- authentication methods, authorization models (RBAC, ABAC, MAC, DAC), federation (SAML, OAuth, OIDC), and privileged access management.
- Secure infrastructure design -- cloud security (IaaS/PaaS/SaaS shared responsibility), containerization, virtualization, serverless security, and infrastructure as code.
- Resilience and redundancy -- high availability, load balancing, RAID, backups (3-2-1 rule), disaster recovery, and geographic redundancy.
Related Labs & Scenarios¶
- Lab 08: Cloud Security Audit -- cloud architecture review
- Lab 06: Active Directory Attack Paths -- IAM security assessment
- Lab 21: Cloud Container Security -- container hardening
- Lab 29: Zero Trust Architecture -- Zero Trust deployment
Practice Questions -- Domain 3¶
Question 1: A company is deploying a web application in AWS. The CISO wants to ensure the organization understands its security responsibilities. Under the shared responsibility model for IaaS, who is responsible for patching the operating system?
A) The cloud service provider (AWS) B) The customer C) Both equally D) Neither -- it is automated
Answer
Correct Answer: B) The customer
Explanation: In the IaaS shared responsibility model, the cloud provider secures the infrastructure (physical data centers, hypervisors, network fabric), while the customer is responsible for everything deployed on that infrastructure: operating systems, applications, data, identity management, and network configurations. In PaaS, the provider takes on OS patching; in SaaS, the provider manages nearly everything except data and user access.
Reference: Chapter 31 -- Cloud Security Architecture
Question 2: Which cryptographic algorithm is an asymmetric encryption standard commonly used for key exchange and digital signatures?
A) AES-256 B) SHA-512 C) RSA D) ChaCha20
Answer
Correct Answer: C) RSA
Explanation: RSA is an asymmetric (public-key) algorithm used for encryption, key exchange, and digital signatures. AES-256 and ChaCha20 are symmetric algorithms (same key for encryption and decryption), and SHA-512 is a hashing algorithm (one-way function, not encryption). Asymmetric algorithms use a key pair -- public key for encryption and private key for decryption.
Reference: Chapter 32 -- Applied Cryptography
Question 3: An organization wants to ensure that network traffic between branch offices is encrypted and authenticated. Which protocol provides both encryption and integrity verification for site-to-site VPN tunnels?
A) PPTP B) IPSec C) TFTP D) Telnet
Answer
Correct Answer: B) IPSec
Explanation: IPSec (Internet Protocol Security) provides confidentiality (encryption via ESP), integrity (HMAC), and authentication (IKE key exchange) for IP traffic. It supports both transport mode (payload only) and tunnel mode (entire packet) and is the standard for site-to-site VPNs. PPTP is deprecated and insecure, TFTP is an unencrypted file transfer protocol, and Telnet transmits data in cleartext.
Reference: Chapter 31 -- Network Security Architecture
Question 4: A security architect is designing an identity system that grants access based on user attributes such as department, clearance level, time of day, and device posture rather than static role assignments. Which access control model is being implemented?
A) Role-Based Access Control (RBAC) B) Mandatory Access Control (MAC) C) Attribute-Based Access Control (ABAC) D) Discretionary Access Control (DAC)
Answer
Correct Answer: C) Attribute-Based Access Control (ABAC)
Explanation: ABAC evaluates multiple attributes (user, resource, environment, action) to make dynamic access decisions. Unlike RBAC, which assigns permissions based on fixed roles, ABAC can incorporate contextual factors like time, location, and device health. This makes ABAC more granular and flexible, though more complex to implement. MAC uses classification labels and clearance levels, and DAC lets resource owners set permissions.
Reference: Chapter 33 -- Identity and Access Security
Question 5: Which network security appliance inspects traffic at all OSI layers, can perform deep packet inspection, and integrates threat intelligence for application-aware filtering?
A) Traditional stateful firewall B) Next-Generation Firewall (NGFW) C) Network switch D) Load balancer
Answer
Correct Answer: B) Next-Generation Firewall (NGFW)
Explanation: NGFWs combine traditional firewall capabilities (stateful packet inspection) with advanced features: deep packet inspection, application identification and control, integrated IPS, threat intelligence feeds, TLS inspection, and user identity awareness. Traditional stateful firewalls only inspect headers and track connection state. Switches operate at Layer 2, and load balancers distribute traffic without deep security inspection.
Reference: Chapter 31 -- Network Security Architecture and NGFW
Question 6: An organization issues digital certificates to employees for email signing. The certificate for a terminated employee must be invalidated before its expiration date. What mechanism is used?
A) Certificate Signing Request (CSR) B) Certificate Revocation List (CRL) C) Certificate Transparency Log D) Key escrow
Answer
Correct Answer: B) Certificate Revocation List (CRL)
Explanation: A CRL is a list published by the Certificate Authority containing serial numbers of revoked certificates. Applications check the CRL (or use OCSP -- Online Certificate Status Protocol -- for real-time queries) before trusting a certificate. CSR is used to request a new certificate, Certificate Transparency logs record certificate issuance for auditing, and key escrow stores backup copies of encryption keys.
Reference: Chapter 32 -- PKI and Certificate Management
Question 7: A company deploys MDM software on all employee mobile devices. Which security capability does MDM provide that a standard VPN cannot?
A) Encrypted communication channels B) Remote wipe of lost or stolen devices C) Authentication before network access D) IP address masking
Answer
Correct Answer: B) Remote wipe of lost or stolen devices
Explanation: Mobile Device Management (MDM) provides device-level control including remote wipe, application management, policy enforcement, geofencing, and containerization of corporate data. VPNs only encrypt network traffic and authenticate users for network access -- they cannot manage the device itself, enforce application policies, or wipe data remotely.
Reference: Chapter 34 -- Mobile and IoT Security
Question 8: Which backup strategy maintains three copies of data, stored on two different media types, with one copy stored offsite?
A) RAID 5 B) 3-2-1 backup rule C) Differential backup D) Incremental backup
Answer
Correct Answer: B) 3-2-1 backup rule
Explanation: The 3-2-1 rule is a data protection best practice: maintain 3 copies of data (primary + 2 backups), on 2 different media types (e.g., disk + tape or disk + cloud), with 1 copy stored offsite (geographically separate). RAID provides disk redundancy but is not a backup strategy, and differential/incremental describe backup scheduling methods rather than the overall strategy.
Question 9: An IoT manufacturer ships devices with default credentials that users rarely change. Which type of vulnerability does this represent?
A) Zero-day vulnerability B) Misconfiguration C) Race condition D) Buffer overflow
Answer
Correct Answer: B) Misconfiguration
Explanation: Default credentials are a misconfiguration vulnerability -- the device is not properly secured out of the box, and users fail to change default settings. This is one of the most exploited vulnerability types in IoT devices, enabling botnets like Mirai. Zero-day refers to unknown/unpatched flaws, race conditions involve timing issues in concurrent processes, and buffer overflows are memory corruption bugs.
Reference: Chapter 34 -- IoT Security Challenges
Question 10: Which Zero Trust principle requires that every access request be verified regardless of whether it originates from inside or outside the corporate network?
A) Implicit trust B) Verify explicitly C) Castle-and-moat security D) Network perimeter defense
Answer
Correct Answer: B) Verify explicitly
Explanation: "Verify explicitly" is a core Zero Trust principle (alongside "use least privilege access" and "assume breach"). It mandates that every access request must be authenticated and authorized based on all available data points -- identity, device health, location, data classification -- regardless of network location. Options A, C, and D describe the traditional perimeter security model that Zero Trust replaces.
Reference: Chapter 39 -- Zero Trust Implementation
Domain 4: Security Operations (28%)¶
Mapped Chapters¶
| Chapter | Title | Key Sections |
|---|---|---|
| Ch04 | SIEM & Data Lake Correlation | Correlation rules, search queries, analytics |
| Ch05 | Detection Engineering at Scale | Signature/behavior rules, MITRE ATT&CK coverage |
| Ch06 | Triage, Investigation & Enrichment | Alert workflows, timeline analysis, pivot techniques |
| Ch07 | Threat Intelligence & Context | Intel feeds, CTI quality, proactive hunting |
| Ch08 | SOAR & Automation Playbooks | Security playbooks, human approval gates, automation ROI |
| Ch09 | Incident Response Lifecycle | NIST framework, containment, eradication, recovery |
| Ch27 | Digital Forensics | Disk/memory/network/cloud forensics, evidence preservation |
| Ch28 | Advanced Incident Response | Nation-state, ransomware, data breach handling |
| Ch35 | DevSecOps Pipeline | CI/CD hardening, secrets management, automated gates |
| Ch38 | Advanced Threat Hunting | PEAK/TaHiTI methodologies, behavioral analytics |
Key Topics¶
- SIEM operations -- log ingestion, correlation rules, alert tuning, search queries (KQL, SPL), and dashboard design for security monitoring.
- Incident response process -- NIST SP 800-61 phases (Preparation, Detection & Analysis, Containment, Eradication & Recovery, Post-Incident Activity), escalation procedures, and documentation.
- Digital forensics -- evidence collection, chain of custody, disk imaging, memory analysis, network packet capture, and legal/regulatory requirements.
- Vulnerability scanning and assessment -- authenticated vs. unauthenticated scans, credentialed scanning, false positive management, and remediation tracking.
- Security automation and orchestration -- SOAR platforms, playbook design, API integrations, and automated response workflows with human-in-the-loop gates.
Related Labs & Scenarios¶
- Lab 01: Synthetic Alert Triage -- SIEM alert analysis
- Lab 02: Detection Tuning -- false positive reduction
- Lab 03: IR Simulation -- incident response walkthrough
- Lab 04: SOAR Safety Checks -- automation with approval gates
- Lab 12: DFIR Artifact Analysis -- forensic evidence examination
- Lab 16: DFIR Memory Forensics -- memory analysis techniques
- Lab 18: Threat Hunting KQL/SPL -- query-based threat hunting
Practice Questions -- Domain 4¶
Question 1: During an incident response, the team has confirmed a compromised server. According to NIST SP 800-61, what is the NEXT phase after Detection and Analysis?
A) Post-Incident Activity B) Preparation C) Containment, Eradication, and Recovery D) Lessons Learned
Answer
Correct Answer: C) Containment, Eradication, and Recovery
Explanation: The NIST SP 800-61 Incident Response Lifecycle follows four phases: (1) Preparation, (2) Detection and Analysis, (3) Containment, Eradication, and Recovery, (4) Post-Incident Activity (Lessons Learned). After confirming a compromise during Detection and Analysis, the team must contain the threat to prevent lateral movement, eradicate the attacker's presence, and recover affected systems.
Reference: Chapter 9 -- Incident Response Lifecycle
Question 2: A SOC analyst is investigating a suspicious process and needs to capture the contents of RAM on a running Windows system before shutting it down. What type of forensic acquisition is this?
A) Disk imaging B) Volatile data collection C) Network capture D) Log export
Answer
Correct Answer: B) Volatile data collection
Explanation: Volatile data exists only in RAM and is lost when the system is powered off. It includes running processes, network connections, loaded DLLs, registry hives in memory, and encryption keys. The order of volatility (RFC 3227) dictates that volatile data must be collected before non-volatile evidence. Tools like WinPMEM, FTK Imager, and Magnet RAM Capture are used for memory acquisition.
Reference: Chapter 27 -- Digital Forensics and Evidence Collection
Question 3: A SIEM correlation rule triggers when it detects five failed login attempts followed by a successful login from the same source IP within 10 minutes. What type of attack does this rule detect?
A) Password spraying B) Brute force authentication attack C) Credential stuffing D) Pass-the-hash
Answer
Correct Answer: B) Brute force authentication attack
Explanation: A brute force attack repeatedly tries passwords against a single account until one succeeds. The SIEM correlation pattern (multiple failures then success from the same IP against the same account) is the classic brute force signature. Password spraying tries one password across many accounts, credential stuffing uses breached credential pairs, and pass-the-hash uses stolen NTLM hashes rather than passwords.
Reference: Chapter 4 -- SIEM Correlation Rules
Question 4: After containing a ransomware incident, the IR team needs to determine the initial access vector. Forensic analysis reveals a malicious macro-enabled document was opened from a phishing email. Which MITRE ATT&CK tactic does this initial access represent?
A) Execution (TA0002) B) Initial Access (TA0001) C) Persistence (TA0003) D) Impact (TA0040)
Answer
Correct Answer: B) Initial Access (TA0001)
Explanation: Initial Access (TA0001) describes how an adversary first gains a foothold in the target environment. Phishing with a malicious attachment (T1566.001) is one of the most common Initial Access techniques. While the macro executing is part of the Execution tactic, the question asks specifically about the initial access vector -- the phishing email that delivered the malicious document.
Reference: Chapter 5 -- Detection Engineering and MITRE ATT&CK
Question 5: A security team wants to automate the enrichment of IP addresses found in SIEM alerts by checking them against threat intelligence feeds and WHOIS databases. Which technology platform would BEST support this workflow?
A) DLP B) SOAR C) NAC D) WAF
Answer
Correct Answer: B) SOAR
Explanation: Security Orchestration, Automation, and Response (SOAR) platforms orchestrate workflows across multiple security tools via API integrations. A SOAR playbook can automatically extract IOCs from SIEM alerts, query threat intelligence platforms, perform WHOIS lookups, and enrich the alert with contextual data -- all without manual analyst intervention. DLP prevents data loss, NAC controls network access, and WAFs protect web applications.
Reference: Chapter 8 -- SOAR and Automation Playbooks
Question 6: During a forensic investigation, an analyst creates a bit-for-bit copy of a suspect's hard drive. Before analysis begins, what must the analyst generate to verify the integrity of the forensic image?
A) Digital certificate B) Cryptographic hash (MD5/SHA-256) C) Access control list D) System restore point
Answer
Correct Answer: B) Cryptographic hash (MD5/SHA-256)
Explanation: A cryptographic hash of both the original drive and the forensic image verifies that the copy is an exact duplicate. If the hashes match, the image is a perfect copy. This hash is documented in the chain of custody and can be verified at any point to prove the evidence has not been tampered with. SHA-256 is preferred over MD5 for forensic work due to MD5's known collision vulnerabilities.
Reference: Chapter 27 -- Digital Forensics and Evidence Integrity
Question 7: A threat hunter forms the hypothesis: 'An adversary is using scheduled tasks for persistence on domain controllers.' They then query endpoint telemetry for schtasks.exe executions on DC hosts. Which threat hunting methodology does this follow?
A) Reactive hunting B) Hypothesis-driven hunting C) Machine-learning-based anomaly detection D) IOC sweeping
Answer
Correct Answer: B) Hypothesis-driven hunting
Explanation: Hypothesis-driven hunting starts with a theory about adversary behavior (based on threat intelligence, ATT&CK techniques, or risk assessment), then proactively searches for evidence supporting or refuting the hypothesis. This is distinct from reactive hunting (triggered by an alert), ML anomaly detection (automated statistical analysis), and IOC sweeping (searching for known indicators). The PEAK framework formalizes this approach.
Reference: Chapter 38 -- Advanced Threat Hunting Methodologies
Question 8: An alert fires indicating that a user account has been added to the Domain Admins group outside of the normal change management window. What should the SOC analyst do FIRST?
A) Remove the account from Domain Admins immediately B) Verify whether the change was authorized through the change management system C) Disable the user account D) Rebuild the domain controller
Answer
Correct Answer: B) Verify whether the change was authorized through the change management system
Explanation: Before taking any action, the analyst must determine if the change is legitimate. Checking the change management system, contacting the IT admin team, and reviewing approval records prevents disrupting authorized administrative actions. Jumping to containment (removing the account, disabling it) without verification can cause unnecessary business disruption. However, if the change is confirmed unauthorized, immediate containment is warranted.
Reference: Chapter 6 -- Triage, Investigation, and Enrichment
Question 9: A CI/CD pipeline includes a secrets scanning step that blocks builds containing hardcoded API keys or passwords. At which stage of the DevSecOps pipeline is this control applied?
A) Runtime protection B) Pre-commit / build-time C) Post-deployment monitoring D) Penetration testing
Answer
Correct Answer: B) Pre-commit / build-time
Explanation: Secrets scanning in the CI/CD pipeline is a "shift left" control that catches credential exposure before code reaches production. Build-time security gates can include SAST (Static Application Security Testing), dependency scanning, secrets detection, IaC policy checks, and container image scanning. Catching secrets before deployment prevents the need for costly credential rotation and reduces breach risk.
Reference: Chapter 35 -- DevSecOps Pipeline Security
Question 10: During a security incident, the IR team needs to preserve the order in which evidence is collected. Which forensic principle requires that the most volatile data (RAM, running processes) be collected before less volatile data (hard drive)?
A) Locard's exchange principle B) Order of volatility C) Best evidence rule D) Chain of custody
Answer
Correct Answer: B) Order of volatility
Explanation: The order of volatility (RFC 3227) dictates that evidence must be collected from most volatile to least volatile: (1) CPU registers/cache, (2) RAM, (3) network state, (4) running processes, (5) disk, (6) remote logging, (7) physical configuration, (8) archival media. Volatile data is lost when power is removed, so it must be captured first. Chain of custody tracks evidence handling, and Locard's principle relates to physical evidence exchange.
Reference: Chapter 27 -- Digital Forensics Methodology
Domain 5: Security Program Management and Oversight (20%)¶
Mapped Chapters¶
| Chapter | Title | Key Sections |
|---|---|---|
| Ch12 | Evaluation Metrics & KPIs | SOC metrics, dashboard design, maturity measurement |
| Ch13 | Security Governance, Privacy & Risk | GDPR, HIPAA, PCI-DSS, AI governance, policy hierarchy |
| Ch14 | Operating Model, Staffing & SLAs | Team structures, SLA design, workload management |
| Ch15 | Resilience & Tabletop Exercises | Purple team programs, organizational learning |
| Ch40 | Security Program Leadership | Board communication, risk translation, budget justification |
Key Topics¶
- Governance frameworks -- NIST CSF, ISO 27001, COBIT, and how organizations select and implement security frameworks based on industry, regulatory requirements, and risk appetite.
- Risk management -- risk identification, qualitative vs. quantitative analysis, risk treatment options (mitigate, transfer, accept, avoid), risk registers, and residual risk.
- Compliance and regulations -- GDPR, HIPAA, PCI-DSS, SOX, CCPA, FERPA, and their specific security requirements including notification timelines, penalties, and data handling obligations.
- Security awareness and training -- program design, phishing simulations, role-based training, metrics for effectiveness, and creating a security culture.
- Third-party risk management -- vendor assessments, SOC 2 reports, SLA requirements, right-to-audit clauses, and supply chain risk evaluation.
Related Labs & Scenarios¶
- Lab 09: Purple Team Exercise -- organizational security testing
- Lab 15: Purple Team Automation -- automated security validation
Practice Questions -- Domain 5¶
Question 1: An organization must comply with a regulation requiring notification of affected individuals within 72 hours of discovering a data breach involving personal data. Which regulation is this?
A) PCI-DSS B) HIPAA C) GDPR D) SOX
Answer
Correct Answer: C) GDPR
Explanation: The EU General Data Protection Regulation (GDPR) requires data controllers to notify the supervisory authority within 72 hours of becoming aware of a personal data breach, and to notify affected individuals "without undue delay" if the breach is likely to result in high risk. HIPAA requires notification within 60 days, PCI-DSS mandates breach notification per card brand rules, and SOX focuses on financial reporting controls rather than breach notification.
Reference: Chapter 13 -- Compliance Frameworks and GDPR
Question 2: A risk assessment identifies a threat with a likelihood of 'Medium' and an impact of 'High.' The organization decides to purchase cyber insurance to cover potential losses. Which risk treatment strategy is being applied?
A) Risk mitigation B) Risk acceptance C) Risk avoidance D) Risk transfer
Answer
Correct Answer: D) Risk transfer
Explanation: Risk transfer shifts the financial burden of a risk to a third party, typically through insurance or contractual agreements. Cyber insurance is the most common form of risk transfer. Mitigation reduces the likelihood or impact through controls, acceptance acknowledges the risk without additional action, and avoidance eliminates the risk by discontinuing the activity that creates it.
Reference: Chapter 13 -- Risk Management Strategies
Question 3: Which framework provides a common language for describing an organization's cybersecurity posture using five core functions: Identify, Protect, Detect, Respond, and Recover?
A) ISO 27001 B) NIST Cybersecurity Framework (CSF) C) COBIT D) CIS Controls
Answer
Correct Answer: B) NIST Cybersecurity Framework (CSF)
Explanation: The NIST CSF organizes cybersecurity activities into five core functions: Identify (asset management, risk assessment), Protect (access control, awareness), Detect (monitoring, anomalies), Respond (incident response, communication), and Recover (recovery planning, improvements). Note: NIST CSF 2.0 added a sixth function, Govern, in 2024. ISO 27001 uses controls in Annex A, COBIT focuses on IT governance, and CIS Controls provides a prioritized set of security actions.
Reference: Chapter 13 -- Governance Frameworks
Question 4: A SOC measures that its Mean Time to Detect (MTTD) decreased from 48 hours to 8 hours after deploying new detection rules. Which category of metric is MTTD?
A) Lagging indicator B) Key Performance Indicator (KPI) C) Key Risk Indicator (KRI) D) Service Level Objective (SLO)
Answer
Correct Answer: B) Key Performance Indicator (KPI)
Explanation: MTTD is a Key Performance Indicator that measures the effectiveness of the detection capability. KPIs track operational performance and progress toward goals. A KRI would measure risk exposure (e.g., number of unpatched critical vulnerabilities), an SLO defines a target threshold (e.g., "MTTD must be under 12 hours"), and a lagging indicator measures outcomes after the fact rather than driving improvement.
Reference: Chapter 12 -- Evaluation Metrics and KPIs
Question 5: Before onboarding a new cloud SaaS vendor that will process customer PII, which assessment should the security team request to evaluate the vendor's control environment?
A) Vulnerability scan results B) SOC 2 Type II audit report C) Penetration test summary D) Network architecture diagram
Answer
Correct Answer: B) SOC 2 Type II audit report
Explanation: SOC 2 Type II reports provide an independent auditor's assessment of a service organization's controls over a period of time (typically 6-12 months) against the Trust Service Criteria (security, availability, processing integrity, confidentiality, privacy). Type II is preferred over Type I because it tests control effectiveness over time, not just design at a point in time. Vulnerability scans and pen tests assess technical security but not the broader control environment.
Reference: Chapter 40 -- Third-Party Risk Management
Question 6: An organization's security policy states that all employees must complete security awareness training within 30 days of hire and annually thereafter. This policy is an example of which type of control?
A) Technical B) Administrative C) Physical D) Compensating
Answer
Correct Answer: B) Administrative
Explanation: Administrative controls (also called managerial controls) are policies, procedures, and guidelines that define how security is managed within an organization. Security awareness training requirements, acceptable use policies, and background check procedures are all administrative controls. Technical controls are implemented in hardware/software, physical controls protect tangible assets, and compensating controls substitute for primary controls.
Reference: Chapter 14 -- Operating Model and Security Policies
Question 7: A CISO presents the board with a risk register showing residual risk after implementing all planned controls. What does 'residual risk' represent?
A) The total risk before any controls are applied B) The risk that remains after controls have been implemented C) The risk transferred to an insurance provider D) The risk the organization has chosen to avoid
Answer
Correct Answer: B) The risk that remains after controls have been implemented
Explanation: Residual risk is the risk that persists after all selected security controls have been applied. It is impossible to eliminate all risk; the goal is to reduce residual risk to a level acceptable to the organization (risk appetite). Inherent risk is the total risk before controls, risk transfer shifts burden to a third party, and risk avoidance eliminates the activity creating the risk. The formula is: Residual Risk = Inherent Risk - Control Effectiveness.
Reference: Chapter 40 -- Security Program Leadership and Risk Communication
Question 8: An organization is subject to PCI-DSS and processes credit card transactions. Which of the following is a PCI-DSS requirement?
A) Notify breaches within 72 hours B) Encrypt cardholder data at rest and in transit C) Appoint a Data Protection Officer D) Conduct a privacy impact assessment annually
Answer
Correct Answer: B) Encrypt cardholder data at rest and in transit
Explanation: PCI-DSS Requirement 3 mandates protection of stored cardholder data (encryption at rest), and Requirement 4 requires encryption during transmission over open/public networks. The 72-hour notification and DPO appointment are GDPR requirements, and annual privacy impact assessments are not a PCI-DSS mandate (though risk assessments are required under Requirement 12).
Question 9: During a post-incident review, the IR team identifies that the same type of phishing attack succeeded three times in six months despite existing email filters. What should the security program prioritize?
A) Replace the entire security team B) Enhanced security awareness training with phishing simulations targeting the identified gaps C) Block all external email D) Accept phishing as an unavoidable risk
Answer
Correct Answer: B) Enhanced security awareness training with phishing simulations targeting the identified gaps
Explanation: Recurring incidents of the same type indicate a gap in the security program. Targeted security awareness training with realistic phishing simulations addresses the human element while improving technical controls (email filters, URL sandboxing). Post-incident lessons learned should drive measurable improvements. Blocking all email or accepting the risk are extreme and impractical responses, and replacing staff does not address the systemic gap.
Reference: Chapter 15 -- Lessons Learned and Continuous Improvement
Question 10: Which document defines the specific security requirements, response times, and penalties between an organization and its managed security service provider (MSSP)?
A) Memorandum of Understanding (MOU) B) Service Level Agreement (SLA) C) Non-Disclosure Agreement (NDA) D) Business Impact Analysis (BIA)
Answer
Correct Answer: B) Service Level Agreement (SLA)
Explanation: An SLA is a binding contract that defines measurable service expectations: response times (e.g., critical alerts acknowledged within 15 minutes), uptime guarantees, escalation procedures, reporting requirements, and penalties for non-compliance. MOUs express mutual intent without legal enforcement, NDAs protect confidential information, and BIAs assess the impact of business disruptions on operations.
8-Week Study Calendar¶
Use this calendar to pace your preparation. Each week includes reading, labs, and practice questions. Adjust based on your experience level -- spend more time on weaker domains.
Week 1: Foundations (Domain 1)¶
| Day | Activity |
|---|---|
| Mon | Read Ch01: Introduction to SOC & AI -- SOC structure, analyst tiers, MITRE ATT&CK |
| Tue | Read Ch02: Telemetry & Logging -- log sources, normalization |
| Wed | Read Ch03: Data Modeling -- schemas, data classification |
| Thu | Read Ch13: Governance -- frameworks, CIA, AAA, access models |
| Fri | Complete Lab 01: Synthetic Alert Triage |
| Sat | Domain 1 practice questions (above) + Quiz Ch01 |
| Sun | Review weak areas, flashcard key terms |
Week 2: Threats and Vulnerabilities (Domain 2, Part 1)¶
| Day | Activity |
|---|---|
| Mon | Read Ch22: Threat Actor Encyclopedia |
| Tue | Read Ch23: Ransomware Deep Dive |
| Wed | Read Ch24: Supply Chain Attacks |
| Thu | Read Ch25: Social Engineering |
| Fri | Read Ch26: Insider Threats |
| Sat | Complete Lab 07: Malware Triage + Lab 10: Threat Hunt |
| Sun | Domain 2 practice questions (Q1-5) |
Week 3: Threats and Vulnerabilities (Domain 2, Part 2) + Architecture Start¶
| Day | Activity |
|---|---|
| Mon | Read Ch29: Vulnerability Management |
| Tue | Read Ch53: Zero-Day Response |
| Wed | Complete Lab 30: Vulnerability Triage |
| Thu | Domain 2 practice questions (Q6-10) + review |
| Fri | Read Ch31: Network Security Architecture |
| Sat | Read Ch32: Applied Cryptography |
| Sun | Review Domain 2, begin Domain 3 flashcards |
Week 4: Security Architecture (Domain 3)¶
| Day | Activity |
|---|---|
| Mon | Read Ch33: Identity & Access Security |
| Tue | Read Ch34: Mobile & IoT Security |
| Wed | Read Ch39: Zero Trust Implementation |
| Thu | Complete Lab 06: AD Attack Paths + Lab 29: Zero Trust |
| Fri | Complete Lab 08: Cloud Security Audit |
| Sat | Domain 3 practice questions + Quiz Ch31 |
| Sun | Review Domains 1-3, identify weak areas |
Week 5: Security Operations (Domain 4, Part 1)¶
| Day | Activity |
|---|---|
| Mon | Read Ch04: SIEM & Correlation |
| Tue | Read Ch05: Detection Engineering |
| Wed | Read Ch06: Triage & Investigation |
| Thu | Read Ch07: Threat Intelligence |
| Fri | Complete Lab 01: Alert Triage + Lab 02: Detection Tuning |
| Sat | Domain 4 practice questions (Q1-5) |
| Sun | Review and flashcards |
Week 6: Security Operations (Domain 4, Part 2)¶
| Day | Activity |
|---|---|
| Mon | Read Ch08: SOAR & Automation |
| Tue | Read Ch09: Incident Response Lifecycle |
| Wed | Read Ch27: Digital Forensics |
| Thu | Read Ch28: Advanced IR + Ch38: Threat Hunting |
| Fri | Complete Lab 03: IR Simulation + Lab 12: DFIR Artifacts |
| Sat | Domain 4 practice questions (Q6-10) + Lab 04: SOAR Safety |
| Sun | Review Domain 4, cumulative review of Domains 1-4 |
Week 7: Security Program Management (Domain 5)¶
| Day | Activity |
|---|---|
| Mon | Read Ch12: Metrics & KPIs |
| Tue | Read Ch14: Operating Model & SLAs |
| Wed | Read Ch15: Resilience & Tabletops |
| Thu | Read Ch40: Security Program Leadership |
| Fri | Complete Lab 09: Purple Team Exercise |
| Sat | Domain 5 practice questions |
| Sun | Full review of all five domains |
Week 8: Review and Practice Exams¶
| Day | Activity |
|---|---|
| Mon | Retake all 50 practice questions from this study path |
| Tue | Complete the Nexus SecOps 100-Question Exam Simulator |
| Wed | Review every missed question -- re-read the referenced chapter sections |
| Thu | Focus study on your two weakest domains |
| Fri | Take a timed practice exam (use exam conditions: 90 min, no notes) |
| Sat | Light review -- flashcards, key terms, acronyms only |
| Sun | REST -- exam day tomorrow |
Study Tips for Security+ SY0-701¶
Performance-Based Questions (PBQs)
SY0-701 includes performance-based questions that require hands-on skills such as configuring firewalls, analyzing logs, or identifying vulnerabilities in a diagram. Nexus SecOps labs provide exactly this type of hands-on practice. Complete as many labs as possible before exam day.
Focus on the Largest Domains
Domain 4 (Security Operations) is worth 28% of the exam -- more than any other domain. If you are short on time, prioritize Domains 4 and 2 (together worth 50% of the exam).
Learn the 'Why,' Not Just the 'What'
The SY0-701 exam tests scenario-based reasoning, not rote memorization. For every control or technology, understand WHY it exists and WHEN you would choose it over alternatives. Nexus SecOps chapters are written with this approach.
Master Acronyms and Frameworks
Security+ is acronym-heavy. Create flashcards for: CIA, AAA, NIST CSF, NIST SP 800-61, GDPR, HIPAA, PCI-DSS, CVSS, EPSS, SIEM, SOAR, RBAC, ABAC, MAC, DAC, PKI, CRL, OCSP, IPSec, MFA, and SSO. Know what each stands for and its primary purpose.
Use the Elimination Method
For multiple-choice questions, eliminate obviously wrong answers first. Security+ often includes one clearly wrong answer, one partially correct answer, and two plausible answers. Understanding the precise definitions helps you distinguish between the two plausible options.
Time Management on Exam Day
With 90 questions in 90 minutes, you have about 1 minute per question. Flag PBQs and difficult questions for review -- answer all multiple-choice questions first, then return to flagged items. Never leave a question unanswered.
Cross-Reference Index¶
Labs Mapped to Security+ Domains¶
MicroSims for Hands-On Practice¶
Explore the MicroSims library for interactive simulations covering:
- Phishing detection and analysis (Domain 2)
- SIEM alert investigation (Domain 4)
- Incident response decision trees (Domain 4)
- Network segmentation design (Domain 3)
- Risk assessment calculations (Domain 5)
Scenarios for Deep Practice¶
Browse the Scenarios library for 100 attack scenarios that reinforce Domain 2 (threats) and Domain 4 (operations) exam objectives through realistic case studies.
Next Steps After Security+¶
After passing Security+, consider these certification paths that build on the same Nexus SecOps content:
| Next Certification | Focus Area | Key Nexus Chapters |
|---|---|---|
| CompTIA CySA+ (CS0-003) | SOC analysis, threat hunting | Ch04-Ch09, Ch38 |
| CompTIA PenTest+ (PT0-002) | Penetration testing | Ch16-Ch17, Ch41-Ch48 |
| GIAC GCIH | Incident handling | Ch09, Ch27-Ch28 |
| (ISC)2 SSCP | Security administration | Ch13, Ch31-Ch33 |
See the full Certifications Roadmap for complete career path guidance.