Skip to content

Hawaii Wedding Directory | Hawaii Destination Weddings

Conveniently plan your Hawaii destination wedding using our extensive list of resources of wedding planners, coordinators, party rentals and the like.

CompTIA Security+ Domain 2 Architecture and Design

Posted on November 4, 2022 By Dave

Security+SY0-601 Domains

Security+ SY0-601 has 5 Domains.
Domain 1.0: Attacks and Threats (24%)
Domain 2.0: Architecture and Design (21%).
Domain 3.0: Implementation (25%).
Domain 4.0: Operations & Incident Response (16%)
Domain 5.0: Governance and Risk Management (14%)
This blog will discuss Architecture and Design, the second domain.
Architecture and Design
Architecture and design are key factors in a well-managed Information Security Environment. This domain will help you to implement security measures and create a safe working environment. This domain has a 21% weight. Below are the subtopics that this domain covers.
Security concepts are important in an enterprise environment.
Virtualization and cloud computing concepts
Secure application development, deployment, automation concepts
Concepts for authorization and authentication
Secure your network.
Security implications of embedded systems and specialized systems.
Importance of physical security checks

Security concepts are important in an enterprise environment
This part will cover Configuration management and its subtopics Diagrams. Baseline Configuration, Standard Naming Conventions, Internet Protocol Schema.
We cover Data sovereignty, Geopolitical considerations, Responses and Recovery Controls, SSL (Secure Sockets Layer), TLS (Transport Layer Security), inspection, API considerations and Site resiliency-Hot site-Cold site-Warm site. We also understand the concept of Deception and disruption.
Honeypots
Honeyfiles
Honeynets
Fake Telemetry
DNS Sinkhole
Cloud Computing Concepts and Virtualization: Cloud computing is based on the principle that you can access and control your applications from any computer anywhere in the world. Virtualization hides or abstracts the storage method and location.
A hacker can breach a cloud with a simple internet connection and a dictionary of hashed passwords or SSH keys. The risk to a business can be greatly increased if there is no supervision of cloud providers’ security procedures.
Security experts should be able analyze the risks and weaknesses associated cloud services and delivery models as well as the virtualization technologies supporting them.
This section will cover Cloud Service Models – Infrastructure as a Service, Software as a Service, Platform as a Service and Software as a Service. We are familiar with Virtualization Technologies concepts. We also cover Cloud Security Controls, VM Sprawl Avoidance and VM Escape protection.
Secure Application Development, Deployment and Automation Concepts: Programming and scripting are the core of secure network administration, management, including automation techniques that can be used for disaster recovery, durability, and incident response. Secure application development will be an increasingly important part of your career. This lesson will cover Secure Coding Techniques: Input validation, Normalization and Output Coding, Server-side as well as Client-side Validation. Data Exposure, Memory Management, Software Development Kit (SDK), and Stored procedures. What is automation and what does it offer? Scalability, Elasticity. We also cover Secure Application Development Environments – Development, Test and Staging, Production. We will learn about Automation/scripting and how to automate processes, Continuous Monitoring, Continuous Validation. Continuous Integration, Continuous Delivery.

Authentication and authorization design concepts

Uncategorized

Post navigation

Previous Post: CompTIA Security+ Domain 1: Attacks and Threats.
Next Post: CompTIA Security+ Domain 3: Implementation

Related Posts

Platform9 Recruits OpenStack To Create Hybrid Clouds With AWS Uncategorized
How to Become Software Developer: 6 Myths That Hold You Back Uncategorized
The Stakeholder Salience model and how to use it Uncategorized
PM Basics Uncategorized
External Resources Uncategorized
Ten Reasons to Get Microsoft Certified Uncategorized

Archives

  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022

Categories

  • Uncategorized

Recent Posts

  • How do you become CISA certified?
  • How to Become an Azure Data Engineer using Microsoft DP-203 Exam and Practice Examinations?
  • 5 Easy Steps to Become an UI Developer
  • How to Become a Software Engineer
  • How to Become Software Developer: 6 Myths That Hold You Back

Recent Comments

  1. A WordPress Commenter on Hello world!

Copyright © 2023 Hawaii Wedding Directory | Hawaii Destination Weddings.

Powered by PressBook Masonry Blogs