Breaking Down The CompTIA Security+

During the last ten years or so,computer security has exploded as a field,both in terms of the complexity and breadth of the field,and the opportunities available for IT professionals focused security.Safety is an integral part of all IT,network management, to web,application and database development.But even with the utmost attention to safety,there is still much to do in the area,and opportunities for IT professionals in mind safety is not likely to diminish in the foreseeable future.

CompTiaSecurityPlus1-640x250For those who already look to the field of IT security,or to improve your career,there are a number of certifications and training opportunities for those wishing to learn about IT-security and show that knowledge of the available current and potential entrepreneurs.However,many IT security certifications requires a higher level of knowledge,experience and commitment that might be beyond the reach of many new IT professionals.

A good certification to demonstrate basic knowledge of security is the CompTIA Security +certification.Unlike other certifications,such as CISSPor theCISM the Security+ has no experience or prerequisites required,although CompTIA not recommend that candidates have at least two years of experience with network security in general and in particular.Also suggest that CompTIA Security+ candidates to obtain the CompTIA Network +certification,but not required.

Although the Security + certification is an entry-level than others,a valuable certification remains in their own right.Indeed,the Security + certification is a must for the Department of Defense United States,and is accredited by both the American National Standard Institute (ANSI) and the International Organization for Standardization (ISO).Another advantage of the Security+ is that it focus regardless of the vendor,instead choosing to safety issues and technologies in general,without their focus on any provider and approach.

Topics Covered by the Security+ Examination

The Security+ certification is basically a generalist means that knowledge of the candidates evaluated in a number of areas of knowledge,as opposed to a focus on the IT sector.So instead maintain a focus on application security only,for example,questions about the Security+ cover a wider range of issues, in line with the defined by CompTIA.

  • Network Security (21%)
  • Compliance and operational security (18%)
  • Threats and vulnerabilities (21%)
  • Application, Data, and Host Security (16%)
  • Access control and identity management (13%)
  • Cryptography (11%)

The exam provides questions from all of the domains above,although it is somewhat weighted to give more emphasis on some areas.For example,you can expect more questions on network security as opposed to cryptography,for example.That said,you shouldn’t necessarily focus your studying on any one area,especially if it leads you to exclude any of the others.A good, broad knowledge of all the domains listed above remains the best way to be prepared for the test.

The Exam

There is only one exam required to earn the Security+ certification. That exam (exam SY0-301) is comprised of 100 questions, and is provided over a 90-minute period. The grading scale is from 100 to 900, with a passing score of 750, or roughly 83% (although that’s just an estimate, because the scale changes somewhat over time).

Next Steps

In addition to the Security+, CompTIA offers a more advanced certification, theCompTIA Advanced Security Practitioner (CASP), providing a progressive certification path for those who want to continue their security career and studies. Like the Security+, the CASP covers security knowledge across a number of knowledge domains, but the depth and complexity of the questions asked on the CASP exam exceed those of the Security+.

Training In U.KCompTIA also offers numerous certifications in other areas of IT as well, including networking, project management and systems administration. And, if security is your chosen field, you might consider other certifications such as the CISSP, CEH, or a vendor-based certification such as the Cisco CCNA Security orCheck Point Certified Security Administrator (CCSA), to extend and deepen your knowledge of security.

CompTIA Exam Queston 30

CompTIA Question :

Server Monitor does NOT provide status information for which Xserve component?

A. blower
B. hard drive
C. power supply
D. fibre channel link

Answer: D

IT As A Utility: CompTIA Offers Survival Tips For MSPs


It’s how we know it is dead? Director Technical Analysis CompTIA Seth Robinson said he thinks it is and explains his thoughts during a presentation at the Software Tigerpaw Partner Conference 2014 in Chicago.The standardization of IT,Robinson said,has meant that the operation receives as use in recent years. He also noted several trends affecting Managed Service Provider (MSP),including:

  • Cloud computing Robinson pointed out 90 percent of companies recently said they use some form of cloud computing. With the cloud, however, these businesses are using resources they do not necessarily own.
  • Mobility While mobility and bring-your-own-device (BYOD) can serve businesses in similar ways, Robinson said they are not interchangeable and can sometimes create security risks.
  • Accessibility Rogue IT and shadow IT are problematic for many IT service providers, according to Robinson.

It was a very exciting time to be in the industry and see all the changes that happened and figure out how to translate your company time,he said.While it may be dead,Robinson said, there are many new opportunities for service providers in the future.All that really means is that we have the opportunity to move into a new phase of IT,he added.Robinson offered seven steps for MSPs to survive:


  1. Become familiar with all the moving pieces  MSPs need to understand all of their IT solutions from front to back, Robinson said: “I think a lot of people assume they are familiar with all of these pieces, but they may realize over time they aren’t as familiar as they think.”
  2. Know how to deliver the best cloud-based architecture  A cloud migration is only one step in the implementation of a cloud-based architecture. Robinson noted MSPs should look beyond just a simple cloud migration and work toward providing customers with the best cloud-based architecture possible.
  3. Make sure clients get the ROI they expect Return on investment (ROI) is key for customers, and Robinson pointed out MSPs need to find ways to ensure every customer recognizes and receives value from their investments.
  4. Get all the right people involved While the IT department can provide feedback, service providers should get their marketing, sales and other departments involved the IT decision-making process as well, Robinson said.
  5. Explore different vertical applications Healthcare, retail and other vertical markets can benefit from IT, and Robinson pointed out service providers can explore opportunities in these markets.
  6. Broaden your vendor network  Connecting with a wide variety of vendors can create new opportunities for MSPs to bolster their offerings, Robinson said.
  7. Build on your existing skill base  The traditional IT skill set has changed drastically over the years, Robinson said. Today’s MSPs need to focus on finding employees who understand business operations, communications and data translation.

CompTIA Exam Queston 29

CompTIA Question :

Which of the following network devices allows Jane, a security technician, to perform malware inspection?

A. Load balancer
B. VPN concentrator
C. Firewall

Answer: D

CompTIA ChannelCon 2014: 5 Ways To Up Customer Security

CompTIA held a series of security talks during last week’s ChannelCon 2014 event in Phoenix, covering such topics as the importance of a well-rounded security plan and how it can help drive their businesses.Ron Culler, CompTIA faculty member and CTO of Secure Designs, hosted the three-part session,sounding off on issues such as endpoint security and implementing lifelong security plans.Here are the top five takeaways from the discussion:


1. Companies can avoid data breaches by implementing endpoint security

Many of the most recent data breaches were the result of sloppy or non-existent safety endpoint,Culler said.For example,Target Black Friday non-compliance could have been avoided if the company had exercised more control over its ecosystem and stricter measures to prevent exploitation adopted. Other threats to corporate data from the increase in reliability of outsourced services and enterprise mobility, piracy leaks or open external sources are to protect tracks. Control who has access to the system is an ideal way to unwanted eyes to remove access to certain information.

2. Encryption needs to be layered to prevent data collection over Wi-Fi

Even the most unskilled hackers can learn how to access enterprise data by simply watching YouTube videos or reading through forums.Companies need to prepare themselves in case of an attack by layering their encryption methods and creating multiple barriers to entry so that accessing sensitive customer payment information and other confidential data is as difficult as possible for potential intruders.

3. Your customer’s business is also your business

If a solution provider is hired to protect the assets of another company, the quality of the protection it offers, is a direct reflection of our own business. As a company looking for a solution provider as a security expert, it is important to understand the business and learn about their responsibility, distribution channels and product regulatory requirements. By reinforcing their own knowledge of the client’s business, solution providers can be better equipped to make the kinds of security measures to understand to keep your business data safe customers.

4. Security is not a one-time purchase; it needs to be dynamic

Many companies mistakenly think of security as a one-time purchase;However,the development of an evolving security strategy should be the number one priority to prevent any breaches of companies.As threats are always changing and evolving,so must also the security of a company to ensure that certain guidelines should not be outdated and exposed.Culler asked participants to think of security as a cycle:You must grow and change over the lifetime of the company.

5. Solution providers should think of security as a business enabler

Security is not just a way to keep intruders out of important business data; it is also a way to show a solution provider’s strength in the market and to cultivate trust among customers. The most successful solution providers will build their brand and reputation on the reliability of their security measures and use this success to attract new customers.Security should be an enabler of business, not just a defensive measure to keep data safe.