CompTIA Certification Prep
Domain guides, practice questions, and study plans for every CompTIA certification — from A+ to CASP+. Built for practitioners working full-time while studying.
Use the selector below to pick a certification and choose how you want to study — guides, practice exams, games, or curated resources.
CompTIA Security+
The most widely recognized entry-level security certification. Required by U.S. Department of Defense Directive 8570/8140 and referenced in hundreds of job postings as a baseline credential for security analyst, SOC analyst, and security engineer roles.
Exam at a glance
- Exam code: SY0-701
- Questions: Maximum 90 (multiple choice + performance-based)
- Time: 90 minutes
- Passing score: 750 (on a 100–900 scale)
- Recommended experience: 2 years IT with security focus; Network+ recommended first
- Renewal: 3-year cycle, 50 CEUs required
- Domain 1: General Security Concepts (12%)
- Domain 2: Threats, Vulnerabilities, and Mitigations (22%)
- Domain 3: Security Architecture (18%)
- Domain 4: Security Operations (28%)
- Domain 5: Security Program Management and Oversight (20%)
Domain breakdown
General Security Concepts
Security controls (technical, managerial, operational, physical), cryptography fundamentals (symmetric, asymmetric, hashing, PKI), authentication methods (MFA, biometrics, tokens), and the security governance framework. Focus areas: control categories and types, cryptographic algorithms (AES-256, RSA, ECC, SHA-256), certificate management and the CA hierarchy, and non-repudiation.
Threats, Vulnerabilities & Mitigations
Malware classification, social engineering attack types, network attacks (MITM, DDoS, DNS poisoning), application vulnerabilities (OWASP Top 10 mapped), and threat intelligence. Focus areas: attack vectors and surface reduction, vulnerability scanning vs. penetration testing, the ATT&CK framework, and threat actor classification (nation-state, hacktivist, insider).
Security Architecture
Cloud security models (IaaS, PaaS, SaaS shared responsibility), Zero Trust principles, network segmentation (DMZ, VLANs, micro-segmentation), VPN types, and secure infrastructure design. Focus areas: cloud deployment models, SD-WAN and SASE, infrastructure as code security, and secure by design principles.
Security Operations
Incident response lifecycle, digital forensics (chain of custody, evidence acquisition), SIEM, log analysis, endpoint security (EDR/XDR), identity and access management operations, and vulnerability management workflow. Focus areas: the IR phases (preparation, detection, containment, eradication, recovery, lessons learned), SOAR, privilege access management, and patching cadences.
Security Program Management & Oversight
Risk management (identification, assessment, treatment), compliance frameworks (NIST CSF, ISO 27001, PCI DSS, HIPAA, SOC 2), data privacy regulations (GDPR, CCPA), third-party risk, and security awareness programs. Focus areas: risk calculation (likelihood × impact), GRC tooling, data classification, and the vendor assessment lifecycle.
CompTIA Network+
The foundational networking certification covering the design, management, and troubleshooting of network infrastructure. Strongly recommended before Security+ and required for many entry-level network technician roles.
Networking Concepts
OSI model layer functions, TCP/IP model, common ports and protocols (HTTP 80, HTTPS 443, SSH 22, DNS 53, DHCP 67/68, SMTP 25/587, RDP 3389), addressing (IPv4 subnetting, IPv6, CIDR notation), and network topologies. Key skill: subnetting calculations from memory.
Network Infrastructure
Routers, switches, firewalls, load balancers, wireless access points, and cabling standards (Cat5e, Cat6, fiber types). VLANs, trunking (802.1Q), spanning tree, and WAN connectivity types (MPLS, Metro Ethernet, SD-WAN).
Network Operations
Network documentation, change management, monitoring tools (SNMP, NetFlow, syslog), high availability concepts (FHRP, VRRP, clustering), backup and recovery, and disaster recovery planning for network infrastructure.
Network Security
Physical security, network hardening (ACLs, firewall rules, disabling unused ports), wireless security (WPA3, EAP types, RADIUS), common attacks (ARP poisoning, MAC flooding, rogue AP), and remote access security (VPN, SSL/TLS).
Network Troubleshooting
Structured troubleshooting methodology, tools (ping, traceroute, nslookup, netstat, Wireshark, cable testers), troubleshooting common connectivity issues, wireless interference diagnosis, and performance problem identification.
CompTIA A+
The entry point to IT support and administration. A+ is required for many help desk, desktop support, and field technician roles. It covers hardware, software, networking basics, security fundamentals, and troubleshooting across two separate exams.
Mobile Devices, Networking, Hardware, Virtualization
Laptop and mobile device hardware, network connectivity (TCP/IP, Wi-Fi standards, cabling), hardware components (CPUs, RAM, storage, power supplies, BIOS/UEFI), printer troubleshooting, and cloud and virtualization concepts.
OS, Security, Software, Operational Procedures
Windows, macOS, Linux, and ChromeOS administration, security best practices (social engineering, malware removal, Windows security settings), software troubleshooting, scripting basics, and professional IT procedures including change management and documentation.
CompTIA CySA+ (Cybersecurity Analyst)
The analyst-level certification for threat detection, incident response, and vulnerability management. Positioned between Security+ and CASP+, CySA+ validates the skills needed for a SOC analyst Tier II/III role.
Security Operations
Log analysis, SIEM tuning, threat intelligence consumption (STIX/TAXII, OpenIOC), threat hunting methodology, and security monitoring architecture including EDR, NDR, and SOAR integration.
Vulnerability Management
Vulnerability scanning (Nessus, OpenVAS, Qualys), CVSS scoring and prioritisation, remediation verification, asset inventory, and exception handling workflow. Includes cloud and container vulnerability considerations.
Incident Response Management
IR phases, evidence collection and preservation, containment and eradication decisions, threat actor attribution, forensic artifact analysis (registry, memory, network captures), and post-incident reporting.
Reporting and Communication
Root cause analysis, executive reporting, compliance reporting requirements, recommended remediation prioritisation, and continuous improvement program design following incidents and assessments.
CompTIA PenTest+
The offensive security certification for penetration testers and red team members. Covers the full penetration testing lifecycle including planning, scoping, reconnaissance, exploitation, post-exploitation, and reporting.
Engagement Management
Rules of engagement, scope definition, statement of work, legal considerations (authorisation letters, NDA), risk acceptance documentation, and communication cadence during an engagement.
Reconnaissance & Enumeration
Passive and active reconnaissance (OSINT, Shodan, theHarvester), network enumeration (Nmap, Masscan), service fingerprinting, DNS enumeration, and web application reconnaissance including directory brute-forcing.
Attacks & Exploits
Network attacks, application attacks (SQLi, XSS, command injection, SSRF), credential attacks, wireless attacks, social engineering, and post-exploitation (lateral movement, persistence, privilege escalation, data exfiltration).
Post-Exploitation & Lateral Movement
Pivoting techniques, living off the land (LOLBins), credential harvesting, privilege escalation paths (Windows/Linux), maintaining access, covering tracks, and data staging for exfiltration.
Reporting & Communication
Technical report writing, executive summary structure, finding classification and CVSS scoring, remediation recommendations, retesting procedures, and client communication best practices.
CompTIA CASP+ (Advanced Security Practitioner)
The expert-level practitioner certification for security architects and senior engineers. CASP+ is performance-based and validates the ability to design, implement, and manage enterprise-level security solutions. It is DoD 8140-approved for senior technical roles.
Security Architecture
Enterprise security architecture patterns, Zero Trust implementation, SASE and SD-WAN security, cryptographic engineering decisions, cloud security architecture (multi-cloud, hybrid), and resilience design including business continuity integration.
Security Operations
Threat modelling, security orchestration and automation, advanced incident response, threat hunting programme design, threat intelligence operationalisation, and forensics at scale. Emphasis on decision-making under uncertainty.
Security Engineering & Cryptography
PKI lifecycle management, HSM usage, quantum-resistant cryptography considerations, secure DevOps pipeline design, hardware security (TPM, Secure Boot), and embedded / OT/ICS security engineering.
Governance, Risk & Compliance
Enterprise risk programme leadership, regulatory alignment strategies, third-party assurance programme management, privacy engineering, and cross-functional security governance including board reporting.
CompTIA Cloud+
Vendor-neutral cloud infrastructure certification covering deployment, security, management, and troubleshooting of cloud environments. Useful for cloud administrators and engineers working across AWS, Azure, and GCP.
Cloud Architecture & Design
Cloud service and deployment models, shared responsibility, cloud migration strategies (lift-and-shift, re-platform, refactor), disaster recovery architecture, and cost optimisation design patterns.
Security
Identity and access management in cloud (IAM policies, RBAC, federation), data protection (encryption at rest and in transit, key management), network security controls (security groups, NACLs, WAF), and cloud audit logging.
Deployment
Infrastructure as code (Terraform, CloudFormation, Bicep), container orchestration (Kubernetes), CI/CD pipelines and DevSecOps integration, serverless architectures, and multi-cloud provisioning.
Operations & Support
Cloud monitoring and observability (CloudWatch, Azure Monitor), autoscaling and elasticity management, patch management for cloud workloads, backup and restore in cloud environments, and cost management tooling.
Troubleshooting
Systematic troubleshooting methodology for cloud connectivity, performance, security, and deployment failures. Includes reading cloud provider dashboards, interpreting error codes, and log correlation.
Practice Questions — Security+
Sample questions aligned to the SY0-701 exam objectives. Use these to test your understanding of key concepts and identify domains that need additional study.
1. An organization implements a policy requiring employees to use a smartcard plus a PIN to access the network. Which type of authentication does this represent?
2. A security analyst receives an alert that a host is communicating with an IP address on a threat intelligence block list. After investigation, the analyst determines the traffic is from a legitimate software update service wrongly listed. What should the analyst do?
3. Which of the following BEST describes the purpose of a SIEM in a security operations centre?
4. An attacker sends a phishing email containing a link that, when clicked, executes a script that harvests the victim's session cookie. Which attack type is this?
5. Which risk treatment option accepts the risk and takes no action to reduce it?
6. A company's web application stores session tokens in cookies without the HttpOnly or Secure flags set. Which TWO vulnerabilities does this directly enable?
document.cookie. Secure restricts the cookie to HTTPS — without it, the browser will send the session cookie over plain HTTP, exposing it to network interception. These are two of the most common misconfigurations caught in web application penetration tests and flagged in OWASP's A07:2021 Identification and Authentication Failures.
7. Which of the following is an example of a compensating control when patching a critical server cannot occur within the standard window?
8. An organisation uses a cloud provider and is responsible for securing the operating system, applications, and data on virtual machines. Which cloud service model does this represent?
9. A digital forensics investigator receives a seized hard drive. Before imaging the drive, which step is MOST critical to maintaining the integrity of the evidence?
10. Which protocol provides mutual authentication between a client and server and is commonly used in wireless 802.1X environments?
Security+ 12-Week Study Plan
Designed for professionals working full-time. Assumes 1.5–2 hours per weekday and 3–4 hours on weekends (approximately 15–20 hours per week total).
Weeks 1–3: Foundations
- Week 1: Domain 1 — General Security Concepts (cryptography, controls, authentication)
- Week 2: Domain 5 — Security Program Management (risk, compliance, GRC frameworks)
- Week 3: Domain 3 — Security Architecture (Zero Trust, cloud models, network design)
Weeks 4–7: Core Domains
- Week 4: Domain 2 — Threats & Vulnerabilities (attack types, threat intelligence)
- Week 5: Domain 4 — Security Operations (IR lifecycle, forensics, SIEM/SOAR)
- Week 6: Domain 4 continued (vulnerability management, IAM operations)
- Week 7: Full first pass review — read through all domain notes
Weeks 8–10: Practice & Gaps
- Week 8: Take first full-length practice exam; identify weak domains
- Week 9: Deep-dive study on weakest two domains
- Week 10: Performance-based question (PBQ) practice — drag-and-drop, simulation
Weeks 11–12: Final Prep
- Week 11: Two more full-length practice exams; target ≥ 80% consistently
- Week 12: Review acronyms, port numbers, and protocol behaviours; final mock on exam day minus 2
- Exam day: No new studying — review notes only; arrive early; flag and return on PBQs
Recommended resources (free & official only)
- Official exam objectives: CompTIA SY0-701 Exam Objectives PDF — the authoritative blueprint; download and study it directly
- Free video course: Professor Messer SY0-701 — complete free course (29+ hours; highest-rated free Security+ resource)
- Free practice tests: Professor Messer free practice exams — three full-length free tests with explanations
- Free labs: TryHackMe free tier — Security+ aligned learning paths accessible without payment
- Primary sources: NIST SP 800 series — the standards underpinning most Security+ risk, IR, and cryptography questions
- Flashcards: Quizlet Security+ community decks — large community-maintained acronym and port-number sets (free tier)
- CompTIA study hall: CertMaster Learn 5-day free trial — official adaptive learning with performance-based question simulation
Practice Questions — Network+
Network+ covers networking fundamentals, implementation, troubleshooting, and security. These questions target the most frequently tested concepts and common exam traps.
1. A host with IP address 172.16.50.10/22 needs to communicate with 172.16.52.1. Will this traffic be routed through the default gateway?
2. You are troubleshooting intermittent connectivity issues on a VLAN. A switch port shows input errors increasing steadily. What is the MOST likely cause?
3. Which DNS record type maps a hostname to an IPv6 address?
4. A network engineer needs to implement a solution to prevent rogue DHCP servers on the network. Which switch feature should be configured?
5. A fibre optic cable is experiencing signal loss. A technician uses an OTDR (Optical Time-Domain Reflectometer) and identifies a sharp spike at 850 metres. What does this indicate?
6. A router is configured with both a static default route and an OSPF-learned route to the same destination. Which route does the router prefer and why?
7. Which 802.11 feature allows a wireless client to move between access points without re-authenticating, maintaining session continuity?
8. A security team needs to prevent hosts on VLAN 10 from communicating with hosts on VLAN 20 while both VLANs must still reach the internet. Where should an ACL be placed to enforce this?
9. Which technology allows a single IP address to be translated to multiple private IPs by tracking source port numbers, enabling many internal hosts to share one public IP?
10. A network technician runs show interface GigabitEthernet0/1 and sees "input errors: 1,200, CRC: 1,200, output errors: 0". What is the MOST likely cause?
Practice Questions — CySA+
CySA+ tests analytical thinking in threat detection, SIEM/SOAR workflows, and incident response. Questions tend to be scenario-heavy — focus on process and tool selection, not just definitions.
1. A SIEM alert fires on 10,000 events per day. After tuning, 99% are eliminated but 100 alerts remain. Analysis shows 90 are legitimate threats and 10 are false positives. How would you classify these metrics?
2. During a threat hunt, an analyst discovers a PowerShell process spawning from winword.exe. The process executes a Base64-encoded command that reaches out to an external IP. Which MITRE ATT&CK tactic does this BEST represent?
3. Which type of analysis uses known malware indicators (file hashes, IPs, domains) to identify infections, and which uses behavioural patterns to detect previously unknown threats?
4. A security analyst receives a vulnerability scan report showing a critical CVE on a production web server. The development team says patching will break a critical integration and requires three months of testing. What is the BEST immediate action?
5. After responding to an incident, the security team conducts a lessons-learned session and identifies that detection took 47 days from initial compromise to alert. Which metric represents this lag?
Practice Questions — PenTest+
PenTest+ covers planning, scoping, information gathering, exploitation, post-exploitation, and reporting. Questions test methodology knowledge and tool selection — not hands-on exploitation skills.
1. During a penetration test engagement, the client asks you to test their internet-facing assets only. Which type of engagement scope does this represent?
2. A tester completes active reconnaissance and identifies an open port 445 on a Windows server. Which is the MOST appropriate next step?
3. Which technique involves capturing a Kerberos service ticket and attempting to crack it offline to recover the service account password?
4. During post-exploitation, a tester discovers that the compromised host runs as SYSTEM. What term describes the process of moving from this host to other systems in the network?
5. A penetration tester's final report should include which of the following for each finding?
Practice Questions — CompTIA A+
A+ is the entry-level credential for help desk and field technician roles. The exam splits into two parts: Core 1 (hardware, networking, mobile, virtualisation, troubleshooting) and Core 2 (OS, security, software troubleshooting, operational procedures). Both must be passed within 3 years.
1. (Core 1) A laptop will not power on. After connecting the AC adapter, the charging LED does not light up. What is the FIRST step a technician should perform?
2. (Core 1) A user reports that printed documents are coming out with vertical white lines on every page. Which printer component is MOST likely the cause on a laser printer?
3. (Core 2) A Windows user receives a UAC prompt every time they launch a specific application. The application is legitimate and trusted. How can a technician suppress the prompt for this single application without disabling UAC globally?
4. (Core 2) A user reports that their Windows 11 PC has become slow and is showing pop-up advertisements in the browser even when no browser windows are open. What is the BEST course of action?
5. (Core 1) Which RAID level provides both performance improvement through striping AND fault tolerance, requiring a minimum of four drives?
Practice Questions — CompTIA Server+
Server+ is the only major server administration credential that is vendor-neutral. It covers server hardware, virtualisation, storage, security, networking, and disaster recovery — a critical foundation for data centre operations and infrastructure engineering roles.
1. A server administrator needs to ensure that a critical database server can continue operating without interruption if a single CPU socket fails. Which technology accomplishes this?
2. A server in a data centre rack frequently reaches 85°C under load. The rack airflow is bottom-to-top. Where should the server be installed for optimal cooling?
3. A server administrator must implement backup retention according to the "3-2-1 rule". Which of the following correctly describes 3-2-1?
4. A virtualisation administrator notices that one VM consistently runs slowly while host CPU utilisation is only 40%. Other VMs perform well. What is the MOST likely cause?
Practice Questions — CompTIA Cloud+
Cloud+ is CompTIA's vendor-neutral mid-level cloud credential, covering architecture, deployment, operations, security, and troubleshooting across AWS, Azure, GCP, and private cloud. It is one of the few cloud certifications that is multi-cloud rather than vendor-specific.
1. A cloud architect needs to design a deployment that automatically reverts to the previous version if health checks fail. Which deployment strategy provides this capability with minimal user impact?
2. A workload running in the cloud experiences a sudden traffic spike that causes the auto-scaling group to add new instances. New instances take 90 seconds to fully bootstrap and pass health checks. Which approach MOST effectively addresses this latency?
3. A cloud workload requires high availability across multiple availability zones. The application uses session state stored in memory on each web server. What architectural change is required?
CompTIA Certification FAQ
How hard is the CompTIA Security+ exam?
Security+ (SY0-701) is considered entry-to-intermediate difficulty. Most candidates with 1–2 years of IT experience and 60–80 hours of focused study pass on their first attempt. The exam includes performance-based questions (PBQs) — scenario simulations that trip up candidates who only study theory. Practice with Professor Messer's free course and a full question bank is the most cost-effective preparation.
Should I get Network+ before Security+?
CompTIA recommends Network+ as a prerequisite but does not require it. If you already understand TCP/IP, subnetting, and common protocols from work experience, you can go directly to Security+. If networking is new to you, Network+ first is strongly advisable — Security+ assumes solid networking fundamentals.
What is the difference between CySA+ and Security+?
Security+ is a broad entry-level credential covering general security concepts. CySA+ (CS0-003) is an intermediate analyst credential focused specifically on threat detection, SIEM analysis, SOAR, and incident response workflows. CySA+ requires Security+ knowledge as a foundation and is the next logical step for security operations and SOC analyst career paths.
Is CASP+ worth getting?
CASP+ (CAS-004) is an expert-level practitioner credential for security architects and senior engineers with 10+ years of experience. Unlike most CompTIA certifications, CASP+ does not expire once earned. It satisfies DoD 8570 IAT Level III requirements and is highly valued for government contractor and senior engineering roles. It is not a management exam — it tests expert-level technical design and implementation decisions.
How long does CompTIA Security+ remain valid?
All CompTIA certifications (except CASP+) are valid for 3 years. You can renew by earning 50 Continuing Education Units (CEUs) through approved training, higher-level certifications, or professional development activities. Alternatively, passing the current version of the exam restarts the 3-year cycle. CompTIA's CertMaster CE online course also satisfies renewal requirements automatically.
Interactive Practice Exam — Security+ SY0-701
A 20-question, 30-minute scenario-based practice test. Each item includes a detailed explanation of why the correct answer is right (and why the other choices are wrong), with links to the authoritative source — NIST, OWASP, MITRE ATT&CK, IETF, RFCs, vendor documentation. Progress auto-saves; you can pause and resume later.
Loading the interactive practice exam… If it does not load, ensure JavaScript is enabled.
Practice Exam #2 — Security+ SY0-701
A second 20-question, 30-minute practice exam with all-new scenarios. Covers cryptography, PKI, network security architecture, Zero Trust, cloud security, SOAR, identity and access management, incident response, and governance. Perfect for a second-pass drill after completing Exam #1.
Loading practice exam… If it does not load, ensure JavaScript is enabled.
Real-World Walkthrough: The 2017 Equifax Breach
Security+ tests concepts; real incidents test whether you understood them. Every SY0-701 domain — vulnerability management, network monitoring, identity, incident response, governance — surfaces in this 147-million-record breach. Map each phase to the domains you are studying.
Timeline
- March 7, 2017: Apache Software Foundation publishes CVE-2017-5638 — an unauthenticated RCE in Apache Struts2's Jakarta Multipart parser.
- March 8, 2017: US-CERT alert reaches Equifax security. A patch advisory goes to the email distribution list — but the list is out of date and the Struts owner does not receive it. Vulnerability scanning later misses the vulnerable host because the scanner was configured against the wrong directory.
- May 13 – July 30, 2017: Attackers exploit CVE-2017-5638 on the Equifax Automated Consumer Interview System (ACIS) dispute portal. They establish web shells, pivot through internal networks using credentials found in plaintext config files, and exfiltrate 147 million consumer records — names, SSNs, DOBs, driver's license numbers, ~209,000 credit card numbers.
- July 29, 2017: An expired certificate on a passive traffic-inspection device is finally renewed. Within hours, anomalous outbound traffic to attacker C2 is detected — proving the exfiltration had been invisible for 76 days because TLS inspection was broken.
- September 7, 2017: Equifax publicly discloses. Stock drops 35% in one week. CEO, CIO, and CISO resign. Final cost: $1.4B+ in remediation, $700M FTC settlement, congressional investigations.
Map to SY0-701 domains
- Domain 4 — Security Operations: Patch management failed because the asset inventory was incomplete and the scanner was misconfigured. SY0-701 explicitly tests CVE prioritisation, asset management, and continuous monitoring.
- Domain 3 — Security Architecture: A flat internal network allowed lateral movement after initial RCE. Segmentation and zero-trust principles would have contained blast radius.
- Domain 2 — Threats & Vulnerabilities: CVE-2017-5638 was a CRITICAL CVSS 10.0 RCE published with a patch on day zero. Reachable internet-facing services must be patched within 24-72 hours per CISA BOD 22-01 today.
- Domain 4 — Detection & monitoring: Expired certificate on the inspection device created a 76-day detection blind spot. PKI lifecycle (cert expiry monitoring) is now an explicit SY0-701 objective.
- Domain 1 — Governance: Disclosure was delayed six weeks while executives sold stock — leading to SEC insider-trading scrutiny. Incident-response policy must define communication AND legal triggers.
- Domain 5 — Program management: The GAO report identified failures in vulnerability scanning policy, asset inventory, network segmentation, and IR coordination — every one of these is on the SY0-701 blueprint.
Study technique: after every domain you study, find one news-grade incident that exemplifies it, and write three paragraphs mapping the technical details to the exam objectives. This consolidates concept retention far better than re-reading.
Helpful Materials — Security+ SY0-701
A short list of resources we actually recommend. We deliberately keep this list lean — quantity is not the same as quality. Use the official objectives as the ground-truth scope and read everything else through that lens.
Official & primary sources
- CompTIA Security+ certification page (objectives PDF — download and use as a checklist)
- NIST Computer Security Resource Center — full SP 800 catalogue
- CISA cybersecurity best-practice guidance
- MITRE ATT&CK Enterprise matrix
- OWASP Top 10 (2021)
Free hands-on labs
Recommended books
- Mike Chapple & David Seidl — CompTIA Security+ SY0-701 Study Guide (Sybex). The mainstream textbook.
- Mike Meyers — CompTIA Security+ Certification All-in-One Exam Guide. Best for visual learners.
- William Stallings — Computer Security: Principles and Practice. Deeper conceptual grounding for cryptography and access control.
Video & community
- Professor Messer — free SY0-701 video course (free, ~30 hours)
- r/CompTIA — exam-day notes and study tips from recent passers
- ITU Online & CompTIA's own YouTube channels
Additional free practice
Security+ SY0-701 Cheatsheet
High-frequency facts that appear repeatedly on the exam. Print this page and review it the morning of the test.
Ports & protocols
- FTP — 20/21 · SFTP — 22 · FTPS — 989/990
- SSH — 22 · Telnet — 23 (avoid)
- SMTP — 25 · SMTPS — 465/587 with STARTTLS
- DNS — 53 (TCP/UDP) · DoT 853 · DoH 443
- HTTP — 80 · HTTPS — 443 · HTTP/3 over QUIC — UDP/443
- POP3 — 110 / POP3S — 995 · IMAP — 143 / IMAPS — 993
- LDAP — 389 · LDAPS — 636
- SMB — 445 · RDP — 3389 (NEVER expose)
- SNMP — 161/162 · Syslog — 514 (UDP) / 6514 (TLS)
- Kerberos — 88 · RADIUS — 1812/1813 · TACACS+ — 49
Cryptography quick facts
- Symmetric: AES (128/192/256), ChaCha20. Fast, single key.
- Asymmetric: RSA (≥2048), ECDSA, Ed25519. Slow, key pair.
- Hashing: SHA-256 / SHA-3. MD5 & SHA-1 are deprecated.
- Password hashing: bcrypt, Argon2id, scrypt, PBKDF2 (salted + costly).
- TLS 1.3 only — TLS 1.0/1.1 deprecated (RFC 8996).
- PFS = ephemeral DH (ECDHE / DHE).
OSI model layers
- L1 Physical — cables, NIC hardware
- L2 Data Link — MAC, Ethernet, switches, ARP
- L3 Network — IP, routers, ICMP, IPsec
- L4 Transport — TCP/UDP, ports
- L5 Session — RPC, SOCKS
- L6 Presentation — TLS, MIME, JPEG
- L7 Application — HTTP, DNS, SMTP, SSH
Mnemonic: Please Do Not Throw Sausage Pizza Away.
Incident response phases (NIST SP 800-61)
- Preparation
- Detection & Analysis
- Containment, Eradication & Recovery
- Post-Incident Activity (lessons learned)
Risk treatment options
- Avoid — stop the activity
- Transfer — insurance, outsourcing
- Mitigate — apply controls
- Accept — formally tolerate residual risk
Flashcards & Term-Matching Game
Active recall beats passive reading for long-term retention. Use the flashcards to drill definitions and the matching game to reinforce connections between concepts. Shuffle to mix domains and reset to start fresh. Keyboard navigation supported on flashcards.
Flashcard Deck — Key Terms
Loading flashcards… ensure JavaScript is enabled.
Term-Matching Game
Click a term on the left, then click its matching definition on the right. Correct pairs lock in green; wrong pairs flash red. Complete all pairs to advance to the next round.
Loading matching game… ensure JavaScript is enabled.
Speed Round — True or False
You have 10 seconds per statement. Answer TRUE or FALSE before the timer runs out. Build a combo multiplier for consecutive correct answers and beat your session high score.
Loading speed round… ensure JavaScript is enabled.
Fill in the Blank
Read the clue and type the missing term. One typo is forgiven for longer answers. Use the hint button if you're stuck — but it costs half the question's points.
Loading fill-in-the-blank… ensure JavaScript is enabled.
Domain Sprint — Categorise the Term
A term appears — click the correct exam domain it belongs to. Correct selections score 100 pts; wrong selections deduct 25 pts. Master domain knowledge before exam day.
Loading domain sprint… ensure JavaScript is enabled.