- Time: Thursday's from 5:00pm-6:00pm
- Location: TBD
- Test Dates: Exam Date, TBD
Exam Code | SYO-501 |
---|---|
Number of Questions | 90 |
Types of Questions | Usually 85 Multiple Choice and 5 performanced based questions |
Length of Test | 90 minutes |
Passing Score | 750 (on a scale of 100-900), roughly 83% to pass |
Price | $339 |
There are six domains each with their on subdomains on which will be tested on the during exam, these include:
- 0. Review
- 1. Threats, Attacks, and Vulnerabilities
- 2. Technologies and Tools
- 3. Architecture and Design
- 4. Identity and Access Management
- 5. Risk Management
- 6. Cryptography and PKI
-
Security Basics
-
Core Security Goals
-
Basic Risk concepts
-
Command Line Tools
-
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
-
1.2 Compare and contrast types of attacks.
-
1.3 Explain threat actor types and attributes
-
1.4 Explain penetration testing concepts.
-
1.5 Explain vulnerability scanning concepts.
-
1.6 Explain the impact associated with types of vulnerabilities.
-
2.1 Install and configure network components, both hardware and software-based, to support organizational security.
-
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
-
2.3 Given a scenario, troubleshoot common security issues.
-
2.4 Given a scenario, analyze and interpret output from security technologies.
-
2.5 Given a scenario, deploy mobile devices securely.
-
2.6 Given a scenario, implement secure protocols.
-
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
-
3.2 Given a scenario, implement secure network architecture concepts.
-
3.3 Given a scenario, implement secure systems design.
-
3.4 Explain the importance of secure staging deployment concepts.
-
3.5 Explain the security implications of embedded systems.
-
3.6 Summarize secure application development and deployment concepts.
-
3.7 Summarize cloud and virtualization concepts.
-
3.8 Explain how resiliency and automation strategies reduce risk.
-
3.9 Explain the importance of physical security controls.
-
4.1 Compare and contrast identity and access management concepts
-
4.2 Given a scenario, install and configure identity and access services.
-
4.3 Given a scenario, implement identity and access management controls.
-
4.4 Given a scenario, differentiate common account management practices.
-
5.1 Explain the importance of policies, plans and procedures related to organizational security
-
5.2 Summarize business impact analysis concepts.
-
5.3 Explain risk management processes and concepts.
-
5.4 Given a scenario, follow incident response procedures.
-
5.5 Summarize basic concepts of forensics
-
5.6 Explain disaster recovery and continuity of operations concepts.
-
5.7 Compare and contrast various types of controls.
-
5.8 Given a scenario, carry out data security and privacy practices.
-
6.1 Compare and contrast basic concepts of cryptography
-
6.2 Explain cryptography algorithms and their basic characteristics.
-
6.3 Given a scenario, install and configure wireless security settings.
-
6.4 Given a scenario, implement public key infrastructure.
Dates | Topics Covered | Reference(Presentations) | Reference(Book) |
---|---|---|---|
Week 4 | 2.4 - 2.6 | Slides 3, 4, 6 | Chapter 2, 3, 4, 5, 6, 10 |
Week 5 | 3.0 - 3.9 | Slide 14 | Chapter 1, 2, 3, 4, 5, 6, 7, 8, 9 |
Week 6 | 4.1 - 4.2 | Slide 15 | Chapter 2, 4 |
Week 7 | 4.3 - 4.4 | Slide 15 | Chapter 2, 4, 5, 8, 9, 11 |
Week 8 | 5.1 - 5.4 | Slides 16, 17 | Chapter 5, 8, 9, 11 |
Week 9 | 5.5 - 5.8 | Slides 16, 17 | Chapter 1, 9, 11 |
Week 10 | 6.1 - 6.2 | Slide 11 | Chapter 1, 2, 7, 10 |
Week 11 | 6.3 - 6.4 | Slide 11 | Chapter 4, 10 |
-
- Exam Day