CompTIA Security+ Cheat Sheet (Updated for SY0-701 Exam)

Top CompTIA Security+ Cheat Sheet (Updated for SY0-701 Exam)

You’ve made a great choice pursuing the CompTIA Security+ certification if you aspire to work in cyber security. It makes you a catch to employers, but the huge amount of study materials can make this a challenging exam. Good news: we’ve got you covered.

This SY0-701 CompTIA Security+ Cheat Sheet provides a high-level overview of key Security+ concepts and abbreviations to support your exam prep. Since Security+ shares significant overlap with Network+, CCNA, and other networking-focused certifications, networking topics are intentionally excluded and should be reviewed separately.

Fortunately, we also have a Network+ Cheat Sheet available, which you can add to your studies.

Download this CompTIA Security+ Cheat Sheet here. When you’re ready, let’s dive in.

What Is the CompTIA Security+ Certification?

The CompTIA Security+ certification focuses on the day-to-day, real-time application of IT security knowledge in the workplace. More than 700,000 IT professionals hold Security+ certification largely because the U.S. Department of Defense (DoD) has approved it as meeting Directive 8140.03-M requirements, and it complies with ISO 17024 standards.

Mastery in the five Security+ domains shows employers that you can perform essential cyber security functions, such as assessing and improving enterprise security posture, monitoring and securing hybrid environments (cloud, mobile, IoT), and handling security incidents while adhering to principles of governance, risk, and compliance.

You’ll need to answer at most 90 questions, either multiple-choice or performance-based, in this 90-minute examination and complete a survey after it ends. The passing score is 750 on a scale of 100–900. The exam costs $425 USD (see all pricing).

The latest CompTIA Security+ exam code is SY0-701. The associated exam has been available since November 2023 and will retire in 2026–2027.

Security+ Domains (SY0-701)

As the landscape of cyber security evolves, so do the primary focus areas (Domains) of the Security+ exam. Every three years, CompTIA updates the Security+ exam to reflect the highest priorities in cyber security.

The latest breakdown of Security+ Domains is as follows:

Security+ SY0-701 DomainExam Weighting (%)
General Security Concepts12%
Threats, Vulnerabilities, and Mitigations22%
Security Architecture18%
Security Operations28%
Security Program Management and Oversight20%

Without further ado, let’s explore each Domain and unpack the essential concepts you will encounter in the exam.

General Security Concepts

This Domain covers essential security concepts, security considerations in change management processes, and cryptography fundamentals.

ConceptDescription
Security controls (Learn to classify them based on given scenarios)Categories:
β€’ Technical
β€’ Managerial
β€’ Operational
β€’ Physical

Control types:
β€’ Preventive
β€’ Deterrent
β€’ Detective
β€’ Corrective
β€’ Compensating
β€’ Directive
CIAConfidentiality, Integrity, and Availability
Non-repudiationImpossible to deny your involvement
AAAAuthentication, Authorization, and Accounting
Gap analysisIdentify weaknesses in one’s current security posture and a clear path toward the desired security posture
Zero-TrustNever trust, always verify
Physical securityTangible security measures around buildings and facilities to control access
Deception and disruption technologyTo catch and understand threat actors.
β€’ Honeypot
β€’ Honeynet
β€’ Honeyfile
β€’ Honeytoken
Change managementPlanning, implementing, and solidifying changes in an organization
OwnershipParties responsible for organizational changes
StakeholdersParties affected by organizational changes
Impact analysisAnalysis of changes within a project and their potential consequences
Test resultsOutcomes of manual/automated tests used to validate changes
Backout planProcedures to restore systems to the previous baseline prior to the latest modifications
Maintenance windowPredefined, scheduled period for planned changes, updates, or maintenance, minimizing disruption to users
Standard operating procedure (SOP)Clear steps for implementing changes with well-defined roles and responsibilities, and strategies for communication geared toward stakeholders
Allow lists/deny listsList-based access control mechanisms permitting/forbidding access to systems
DowntimeTime when a system is unavailable
Legacy applicationOutdated software still in use, often with known vulnerabilities
DependencyCode packages required by a project to run properly
Version controlThe practice of tracking and managing changes to files, often collaboratively
PKIPublic key infrastructure
Encryption levelsβ€’ Full-disk
β€’ Partition
β€’ File
β€’ Volume
β€’ Database 
Symmetric cipherStreaming:
β€’ RC4

Block:
β€’ DES
β€’ Blowfish
β€’ 3DES

Considerations:
β€’ key length
β€’ block size
β€’ number of rounds
Asymmetric cipherExamples:
β€’ Diffie-Hellman key exchange
β€’ RSA
β€’ Elliptic-curve cryptography
TPMTrusted Platform Module
HSMHardware security module
Key management systemSystem for managing cryptographic keys and their metadata
Secure enclaveIsolated hardware system for protecting sensitive data and operations
Steganography Hide data inside other data
TokenizationSubstituting sensitive data elements with non-sensitive equivalents (tokens) with no intrinsic or exploitable meaning or value
Data maskingReplacing sensitive data with fake, usable data for added security
HashingOne-way, deterministic process of transforming a string of characters into another
SaltingCharacters appended to a string (e.g., password) before hashing
Digital signaturePublic key sender verified to own corresponding private key
Key stretchingMethod that strengthens weak passwords
BlockchainDecentralized digital ledger of records linked sequentially by cryptographic hashes
Open public ledgerFreely accessible and verifiable system of transactional data
Certificate authorityIssuer of digital certificates to ensure the legitimacy of web hosts
CRLCertificate revocation list
OCSPOnline Certificate Status Protocol
Self-signed certificateSame issuer and subject
Third-party certificateThe issuer has no direct affiliation with your hosting or server environment
Root of trustSecure, trusted source within a cryptographic system such as HSM
CSRCertificate signing request
Wildcard certificateSecure a domain and all its first-level subdomains using an asterisk (*)
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart

The next Domain has everything to do with offensive and defensive hacking.

Threats, Vulnerabilities, and Mitigations

All you must know about threat actors, threat vectors, vulnerabilities, indicators of malicious activity, and threat mitigation techniques are in this Domain.

ConceptDescription
Threat actorVulnerability exploiter.Attributes:
β€’ Internal/external
β€’ Resources/funding
β€’ Level of sophistication/capability

Motivations:
β€’ Data exfiltration
β€’ Espionage
β€’ Service disruption
β€’ Blackmail
β€’ Financial gain
β€’ Philosophical/political beliefs
β€’ Ethical
β€’ Revenge
β€’ Disruption/chaos
β€’ War
Nation-state threat actor/state actorForeign government agent
Unskilled attacker/script kiddieExecutor of pre-made programs
HacktivistPolitically motivated agent
Insider threatSaboteur inside an organization
Organized crimeProfit-driven agent with intent to blackmail
Shadow ITIT systems deployed without the central IT department’s oversight
Malware attacksβ€’ Virus
β€’ Worm
β€’ Trojan
β€’ Rootkit
β€’ Keylogger
β€’ Spyware
β€’ Bloatware
β€’ Ransomware
β€’ Logic bomb
MSPManaged service provider
Social engineeringPrinciples (reasons for effectiveness):
β€’ Authority
β€’ Intimidation
β€’ Consensus
β€’ Scarcity
β€’ Familiarity
β€’ Trust
β€’ Urgency
Phishing attackBy email; single target
Vishing attackBy telephone or voicemail
Smishing attackBy SMS text message
Misinformation/disinformationExploitation of human vulnerabilities
Impersonation, identity fraud/theftAttacks using stolen credentials or personal information
Business email compromiseImpersonate trusted leaders to trick employees into sending money or data or granting privileged access
PretextingDigital gunpoint with the ransom being one’s private information
Watering holeInfect a trusted website
Brand impersonationPose as a trusted brand to dupe victims and steal their data
TyposquattingAttacks using mistyped web addresses
TOCTime-of-check
TOUTime-of-use
SQLiStructured Query Language injection
XSSCross-site scripting
Memory injectionInjecting malicious code into memory to execute unauthorized commands
Buffer overflowAmount of data in the buffer exceeds its storage capacity
Malicious updateHarmful code disguised as a legitimate software update
Side loadingInstalling mobile apps from sources outside official app stores
JailbreakBypassing inbuilt security restrictions in mobile devices to install unauthorized software
AgentlessWithout requiring the installation of dedicated software agents
End-of-lifeNo longer supported by the vendor
Virtual machine (VM) escapeMalicious code running inside a VM gains unauthorized access to the host operating system or other VMs on the same physical server, thus potentially controlling all
Race conditionA vulnerability in which multiple process threads β€œrace” against each other to access/change the data simultaneously, leading to unpredictable and potentially harmful outcomes
Amplified network attackGenerate such a large volume of traffic that it disrupts normal traffic to a web property; includes DDoS attack
Reflected network attackFlood a victim’s system with traffic by leveraging the responses from a third-party server
Radio frequency identification (RFID) cloningTamper with access control, authentication, or sensitive data storage by the unauthorized copying or duplication of the information stored on an RFID tag
Distributed denial-of-service (DDoS) attackCybercrime; flood a server with internet traffic preventing legitimate users from access
Domain Name System (DNS) attackExploit vulnerabilities in DNS
Wireless attackCompromise the security of a wireless network such as by exploiting vulnerabilities
On-path attackEavesdrop; secretly intercept or modify communication between two parties who believe they are communicating directly
Replay attackIntercept data and replay later for gaining unauthorized access or triggering unintended actions
Credential replay attackIntercept and reuse stolen authentication credentials (e.g., usernames, passwords, session tokens) to gain unauthorized access
Privilege escalationGain unauthorized access to higher-level permissions
Forgery attackDeceive the recipient about the identity of the sender
Directory traversalAccess files and directories stored outside the web root folder
Downgrade attackForce a system to use a weaker protocol or encryption method
Collision attackFind two different inputs that produce the same hash value when passed through a cryptographic hash function
Birthday attackExploits birthday paradox (>50% probability of two people sharing the same birthday in a group of 23 people) to find collisions in hash functions
Brute-force attackTrying character combinations
Spraying attackTrying the same password across different accounts
Configuration enforcementEnsuring hardware/software adherence to predefined security settings and policies
Application allow listBlock any application not on the list from running
ACLAccess control list
PatchingApplying updates or fixes to address bugs and vulnerabilities
Least privilegeOnly grant the minimum necessary rights to perform designated tasks
DecommissioningRetiring assets from operation, including data sanitization
HardeningTools and techniques to reduce vulnerabilities in systems, applications, etc.
Host-based firewallNetwork traffic filter on a single computer/server
HIPSHost-based Intrusion Prevention System
HIDSHost-based Intrusion Detection System

What makes a system vulnerable? The next Domain offers an in-depth look.

Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image

Security Architecture

On a macro level, aspiring cyber security professionals must learn about network architecture models, enterprise infrastructure, data protection, and measures for resilience and recovery.

ConceptDescription
IPSIntrusion prevention system
IDSintrusion detection system
EAPExtensible Authentication Protocol
WAFWeb application firewall
UTMUnified threat management
NGFWNext-generation firewall
IaCInfrastructure as code
Air-gappedHardware isolation of computer/network from external connections to protect it from malicious activity
Logical segmentationDivision of computer system into isolated segments using software
RTBHRemotely Triggered Black Hole
SDNSoftware-defined networking
ICSIndustrial control systems
SCADASupervisory Control and Data Acquisition
ContainerizationPackaging applications and their dependencies together into a single unit (container)
VirtualizationCreation of virtual environments from a single physical machine for efficient use of computing resources
RTOSReal-time operating system
Fail-openA system defaults to an operational state, allowing continued functionality in the event of failure
Fail-closedA system defaults to shutdown and prevention of further operations in the event of failure
ServerlessUsers can write and deploy code without worrying about the underlying infrastructure
MicroservicesInfrastructure where small, independent, and loosely coupled services make up an application
Active deviceActively participate in network traffic flow
Passive deviceOnly observe network traffic
Inline deviceSit in the data path, able to block or modify malicious traffic
Tap/monitor devicePassively monitor the traffic but won’t take action upon finding anything malicious
Jump serverFunnel traffic through firewalls using a supervised secure channel
Proxy serverGateway between end users and the web pages they visit only; able to prevent cyber attackers from entering a private network
IEEE 802.1XStandard for port-based network access control
Responsibility matrixResponsible, Accountable, Consulted, Informed
IoTInternet of Things
Embedded systemsSmall computers integrated into larger systems to execute specific tasks such as graphics, data processing, and sensing
Remote accessConnecting to networks and systems from remote locations
TunnelingData transfer by wrapping a data packet in another
VPNVirtual private network
TLSTransport Layer Security
IPSecInternet protocol security
SD-WANSoftware-defined wide area network
SASESecure access service edge
Data at restOn computer storage
Data in use/processingIn RAM being accessed
Data in transit/motionTraveling along cables or broadcasting wirelessly
Data sovereigntyA country or jurisdiction has the authority and right to govern and control the data generated within its borders
GeolocationIdentify the geographical location of a device or user
High availabilityA system’s ability to operate continuously for a designated uptime despite individual component failure
Load balancingDistribute workloads or network traffic across multiple servers to prevent overloading and improve application performance and availability
ClusteringCombination of servers to function as a single unit for redundancy and increased processing power
SnapshotsPoint-in-time backups of data or systems to aid recovery
Cold sitePower, networking capability, and cooling; no servers or storage
Warm siteCold site plus storage hardware; still requires data transportation
Hot siteFully functional backup site with important data mirrored to it
COOPContinuity of operations
UPSUninterruptiblepower supply

We go further into individual components of a system in the next Domain.

Security Operations

On a micro level, aspiring cyber security professionals should also know how to protect and monitor computing resources and data assets, incident response, as well as identity and access management.

ConceptDescription
MDMMobile device management
BYODBring your own device
COPECorporate-owned, personally enabled
CYODChoose your own device
WPA3Wi-Fi Protected Access 3
RADIUSRemote Authentication Dial-In User Service
Application securityMeasures to protect software from threats and vulnerabilities during SDLC
Input validationEnsuring data conforms to predefined standards
Secure cookiesTransmittable over HTTPS but not HTTP
Static code analysisExamining source code without execution to identify errors, vulnerabilities, and deviations from coding standards
Code signingDigital verification of software authenticity and integrity
SandboxingIsolation of programs/processes in a virtual environment to limit potential damage

Finally, we conclude with globally recognized best practices in managing cyber security programs.

Security Program Management and Oversight

This Domain is responsible for cyber security concepts and acronyms related to governance, risk, and compliance.

ConceptDescription
SLAService-Level Agreement
MOAMemorandum of Agreement
MOUMemorandum of Understanding
MSAMaster Service Agreement
WOWork Order
SOWStatement of Work
NDANon-disclosure Agreement
BPABusiness Partners Agreement
BCPBusiness Continuity Plan
COOPContinuity of operations
DRPDisaster Recovery Plan
IRPIncident Response Plan
IoCIndicators of Compromise
AUPAcceptable Use Policy
SDLCSoftware Development Lifecycle
GDPRGeneral Data Protection Regulation
PCI DSSPayment Card Industry Data Security Standard
ISOInternational Organization for Standardization
CSACloud Security Alliance
AVAsset Value
EFExposure Factor
SLESingle Loss Expectancy = AV Γ— EF
AROAnnualized Rate of Occurrence
ALEAnnualized Loss Expectancy = SLE Γ— ARO
BIABusiness impact analysis
MTBFMean time between failures
MTTFMean time to failure
MTTRMean time to repair
RTORecovery time objective
RPORecovery point objective
Residual riskRemaining risk after mitigation

CompTIA Security+ Cheat Sheet Conclusion

This CompTIA Security+ Cheat Sheet is a checklist covering the examination syllabus, excluding networking topics, and we hope it gives you a bird’s-eye view of non-networking key topics in cyber security.

Want to maximize your chances of success? We offer a CompTIA Security+ Course & SY0-701 Practice Test Bundle available as a one-time purchase. This grants lifetime access to over 20 hours of video training, three full-length practice exams, flashcards, and more. 

You can also look at our StationX Master’s Program for complete career guidance, mentorship, a personalized certification roadmap, access to over 30,000 courses and labs, and much more.

Don't forget you can purchase an official CompTIA Security+ exam voucher through StationX at a tremendous discount! 

However you choose to proceed in your cyber security career, we wish you the best of luck!

This bundle contains:

Frequently Asked Questions

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

  • Cassandra Lee

    Cassandra Lee is a Certified in Cybersecurity (CC) professional, freelance programmer, and former robotics operator. With a background in data science, web development, and journalism, she’s contributed to outlets like HuffPost and Ada Lovelace Day, and advocates passionately for women in STEM through writing, speaking, and mentorship. You can find Cassandra on LinkedIn and Linktree.

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!