CompTIA Security+ · SY0-701 · 2026 · Quick Reference

CompTIA Security+ Cheat Sheet

Every cryptography algorithm, threat and attack type, IAM concept, PKI term, network security control, incident response step, and compliance framework you need for the SY0-701 exam — on one page.

Cryptography Threats & Attacks Network Security IAM PKI & Certs Vulnerabilities Incident Response Frameworks Wireless Security Acronyms
🔐 Cryptography
⚡ Exam tip: Know symmetric vs asymmetric, which algorithms are weak vs strong, and what each is used for. AES = encryption, SHA = hashing, RSA = key exchange/signatures. These distinctions appear constantly.
AlgorithmTypeKey SizeUse CaseExam Note
AESSymmetric128 / 192 / 256-bitBulk data encryptionCurrent standard — AES-256 strongest
3DESSymmetric112 / 168-bitLegacy encryptionDeprecated — being phased out
DESSymmetric56-bitLegacyWeak — considered broken
RSAAsymmetric2048 / 4096-bitKey exchange, digital signatures2048-bit minimum; slow for bulk data
ECCAsymmetric256-bit ≈ RSA 3072Mobile, IoT, TLSSame security as RSA with smaller keys
Diffie-HellmanAsymmetricKey exchange onlyDH = static; DHE = ephemeral (forward secrecy)
MD5Hash128-bit outputLegacy integrity checkBroken — collision vulnerable, do not use
SHA-1Hash160-bit outputLegacyDeprecated — weak, replaced by SHA-2
SHA-256Hash256-bit outputFile integrity, certificatesSHA-2 family — current standard
SHA-3HashVariableHigh-security hashingDifferent design from SHA-2; backup standard
HMACHash + KeyMessage authenticationHash + secret key = proves integrity AND authenticity
PBKDF2 / bcryptKey DerivationPassword hashingSlow by design — defeats brute force

Symmetric vs Asymmetric

  • Symmetric Same key encrypts + decrypts
  • Asymmetric Public key encrypts, private decrypts
  • Symmetric is faster Used for bulk data
  • Asymmetric is slower Used for key exchange
  • Hybrid (TLS) Asymmetric to share symmetric key

Encryption Modes (AES)

  • ECB Weak — same block = same cipher
  • CBC IV + XOR — common, sequential
  • CTR Stream mode, parallelisable
  • GCM Authenticated encryption — preferred
  • OFB / CFB Stream-like from block cipher
Forward Secrecy: DHE and ECDHE generate a new session key for every connection. If the server's private key is later compromised, past sessions cannot be decrypted. Required for PFS (Perfect Forward Secrecy).
⚠️ Threats & Attacks
⚡ Exam tip: Security+ SY0-701 heavily tests threat categories. Know: social engineering indicators, malware types, application attacks (SQLi, XSS, buffer overflow), and network attacks (MitM, replay, DoS/DDoS).
Attack / ThreatCategoryHow It WorksKey Defence
PhishingSocial EngineeringFraudulent email impersonating trusted entityEmail filtering, user training, SPF/DKIM/DMARC
Spear PhishingSocial EngineeringTargeted phishing using personal infoMFA, security awareness training
WhalingSocial EngineeringPhishing targeting executives (CFO, CEO)Out-of-band verification for wire transfers
VishingSocial EngineeringVoice phishing via phone callCall-back verification procedures
SmishingSocial EngineeringSMS phishing with malicious linksUser training, MDM, URL filtering
PretextingSocial EngineeringFabricated scenario to extract infoIdentity verification procedures
Tailgating / PiggybackingPhysicalFollowing authorised person through secure doorMantraps, security guards, access cards
RansomwareMalwareEncrypts files, demands payment for keyOffline backups (3-2-1 rule), patch management
Trojan HorseMalwareMalicious code disguised as legitimate softwareApplication whitelisting, AV
RootkitMalwareHides itself at OS/firmware levelSecure Boot, TPM, OS reinstall
KeyloggerMalwareRecords keystrokes to capture credentialsMFA, virtual keyboards, EDR
RATMalwareRemote Access Trojan — gives attacker controlEndpoint protection, network monitoring
WormMalwareSelf-replicates across network without user actionNetwork segmentation, patching
SQL InjectionApplicationMalicious SQL in input fields queries DB directlyParameterised queries, input validation, WAF
XSSApplicationInjects scripts into web pages viewed by usersOutput encoding, CSP headers, WAF
CSRFApplicationForces authenticated user to submit malicious requestCSRF tokens, SameSite cookie flag
Buffer OverflowApplicationOverwrites memory to execute arbitrary codeASLR, DEP, input validation, safe coding
Man-in-the-MiddleNetworkIntercepts communication between two partiesTLS/HTTPS, certificate pinning, MFA
Replay AttackNetworkCaptures and re-sends valid authentication tokensNonces, timestamps, session tokens
DoS / DDoSNetworkFloods target with traffic to cause outageRate limiting, CDN, scrubbing centres
DNS PoisoningNetworkCorrupts DNS cache to redirect usersDNSSEC, secure resolvers
ARP SpoofingNetworkLinks attacker MAC to legitimate IPDynamic ARP Inspection (DAI), static ARP
Pass-the-HashCredentialUses captured NTLM hash without cracking itPrivileged Access Workstations, Credential Guard
KerberoastingCredentialRequests service tickets to crack offlineLong service account passwords, AES encryption
Brute ForceCredentialTries all password combinationsAccount lockout, MFA, long passwords
Rainbow TableCredentialPre-computed hash lookup tablePassword salting defeats rainbow tables
🛡️ Network Security Controls
ControlWhat It DoesExam Key Fact
FirewallFilters traffic by port, IP, protocolStateful = tracks connections; stateless = packet-by-packet
NGFWNext-Gen Firewall — adds DPI, IPS, app awarenessOperates at Layer 7; understands application context
IDSIntrusion Detection System — alerts onlyPassive — detects and logs, does NOT block
IPSIntrusion Prevention System — blocks inlineActive — sits inline, can drop malicious packets
WAFWeb Application Firewall — filters HTTP/SProtects against SQLi, XSS, CSRF at app layer
SIEMSecurity Info & Event Management — aggregates logsCorrelates events from multiple sources; used for forensics
SOARSecurity Orchestration, Automation & ResponseAutomates incident response playbooks; extends SIEM
NACNetwork Access Control — checks device postureQuarantines non-compliant devices before granting access
HoneypotDecoy system to attract and study attackersNo legitimate traffic should reach it — any access = alert
DMZDemilitarised Zone — buffer between internet and LANPublic-facing servers (web, email) placed here
VPNEncrypted tunnel over untrusted networkSite-to-site vs remote access; split tunnel = partial routing
Zero TrustNever trust, always verify — no implicit trust by networkMicrosegmentation + identity verification at every hop
SD-WANSoftware-defined WAN with centralised controlEncrypts branch traffic; replaces MPLS in modern networks
IDS vs IPS exam trap: IDS = passive monitoring, generates alerts. IPS = active, sits inline, drops packets. NIDS/NIPS = network-based. HIDS/HIPS = host-based. Know which generates false positives (both can) and which can block (only IPS).
👤 Identity & Access Management (IAM)
ConceptDefinitionExam Key Fact
AuthenticationProving identity (who you are)Something you know / have / are
AuthorisationGranting permissions (what you can do)Happens AFTER authentication
AccountingLogging and auditing activityAAA = Authentication, Authorisation, Accounting
MFAMulti-Factor Authentication — 2+ factor typesTwo of the same type = NOT MFA (two passwords = single factor)
TOTPTime-based One-Time PasswordChanges every 30s — Google Authenticator, Microsoft Authenticator
HOTPHMAC-based One-Time PasswordCounter-based — valid until used, not time-limited
SSOSingle Sign-On — one login for multiple systemsReduces password fatigue; SAML and OIDC are common protocols
SAMLSecurity Assertion Markup LanguageXML-based SSO for web apps; IdP issues assertion to SP
OAuth 2.0Authorisation framework — delegates accessUsed for "Login with Google" — grants access tokens, not identity
OIDCOpenID Connect — identity layer on OAuth 2.0Adds authentication to OAuth; returns ID token with user info
DACDiscretionary Access ControlOwner controls permissions — most flexible, least secure
MACMandatory Access ControlLabels/classifications enforced by OS — most rigid
RBACRole-Based Access ControlPermissions assigned to roles, users assigned to roles
ABACAttribute-Based Access ControlPolicy based on user + resource + environment attributes
PoLPPrinciple of Least PrivilegeGrant minimum access needed — applies to users AND services
Separation of DutiesNo single person controls entire processExample: person who requests payment ≠ person who approves it
PAMPrivileged Access ManagementControls and audits admin/privileged accounts specifically
FederationTrusts identities from external organisationsIdP + SP relationship — used in B2B and cloud SSO
📜 PKI & Certificates
⚡ Exam tip: PKI questions test the chain of trust. Know: CA hierarchy (Root → Intermediate → End-entity), what each certificate field means, and what happens during TLS handshake. Certificate pinning and CT logs appear in SY0-701.
TermDefinitionExam Note
PKIPublic Key Infrastructure — framework for managing digital certsBinds public keys to identities via digital signatures
CACertificate Authority — issues and signs certificatesRoot CA → Intermediate CA → End-entity cert chain
Root CATop of the trust hierarchy — self-signedKept offline (air-gapped) to protect private key
Intermediate CAIssues certs on behalf of root CAOnline; if compromised, root CA can revoke it
CSRCertificate Signing RequestEntity generates key pair, sends public key + info to CA
X.509Standard format for digital certificatesContains: subject, issuer, public key, validity period, signature
SANSubject Alternative NameOne cert covers multiple domains (replaces CN for multi-domain)
Wildcard Cert*.example.com covers all subdomainsOne level only — *.example.com ≠ *.sub.example.com
CRLCertificate Revocation ListPublished list of revoked certs; must be downloaded and checked
OCSPOnline Certificate Status ProtocolReal-time revocation check; OCSP stapling = server includes proof
Certificate PinningApp hardcodes expected certificate/keyPrevents MitM even with valid but malicious CA cert
CT LogsCertificate Transparency — public append-only logBrowsers require CT — detects mis-issued certificates
TLS Handshake — Simplified

1. Client Hello → TLS version, cipher suites, random nonce
2. Server Hello → Chosen cipher suite, server certificate
3. Certificate → Client verifies cert chain, validity, revocation
4. Key Exchange → ECDHE: ephemeral keys exchanged (forward secrecy)
5. Session Keys → Both sides derive symmetric session key (AES)
6. Finished → Encrypted handshake verified — data transfer begins

# Asymmetric crypto used ONLY for key exchange — symmetric AES encrypts actual data
🔍 Vulnerability Management
TermDefinitionExam Note
CVECommon Vulnerabilities & Exposures — unique vuln IDsCVE-YEAR-NUMBER format; published by NVD
CVSSCommon Vulnerability Scoring System — 0–10 severityCritical = 9.0–10.0; High = 7.0–8.9; Medium = 4.0–6.9
Zero-DayVulnerability with no patch available yetNo vendor fix exists — highest risk; IOC monitoring critical
Patch ManagementProcess of testing and applying software updatesIdentify → Test → Deploy → Verify; test before production
Vulnerability ScanAutomated scan to identify known vulnerabilitiesNon-invasive; credentialed scan = more thorough
Penetration TestAuthorised simulated attack to find exploitable vulnsActive exploitation; requires written authorisation (RoE)
Red TeamOffensive security team simulating real attackersFull attack simulation; blue team defends; purple team = both
Threat IntelligenceKnowledge about current threats, TTPs, indicatorsIOC = Indicator of Compromise; TTPs = Tactics, Techniques, Procedures
Attack SurfaceAll points where attacker could try to enterReduce by disabling unused services, ports, accounts
Supply Chain AttackCompromising software/hardware before deliverySolarWinds = classic example; trust the vendor chain
🚨 Incident Response
⚡ Exam tip: Know the NIST IR lifecycle and the order of steps. Containment comes before eradication. Documentation happens throughout. Chain of custody is critical for forensics evidence admissibility.
NIST Incident Response Lifecycle

Phase 1: Preparation → IR plan, tools, training, communication contacts
Phase 2: Detection → Identify incident via SIEM, IDS, user reports
Phase 3: Containment → Short-term (isolate) + long-term (patch, rebuild)
Phase 4: Eradication → Remove malware, close attack vectors, patch
Phase 5: Recovery → Restore from clean backups, monitor for re-infection
Phase 6: Lessons Learned → Post-incident review, update IR plan

# Order matters on the exam — Containment BEFORE Eradication BEFORE Recovery

Digital Forensics Order of Volatility

  • 1. CPU registers + cache Most volatile
  • 2. RAM / running processes Volatile
  • 3. Network connections Volatile
  • 4. Running processes / temp files Volatile
  • 5. Disk storage Persistent
  • 6. Remote / cloud logs Least volatile

Evidence Handling

  • Chain of custody Tracks who touched evidence
  • Legal hold Preserve data — do not delete
  • Bit-for-bit image Never work on original
  • Hash verification MD5/SHA to prove integrity
  • Write blockers Prevent altering disk evidence
📋 Frameworks, Regulations & Compliance
Framework / RegulationWho / WhatKey Requirement
NIST CSFUS voluntary cybersecurity framework5 functions: Identify, Protect, Detect, Respond, Recover
NIST SP 800-53US federal security controls catalogueRequired for federal agencies; used as baseline globally
ISO 27001International ISMS standardRisk-based; certifiable; Annex A = 93 security controls
PCI DSSPayment Card Industry — card data security12 requirements; applies to any org storing/processing cards
HIPAAUS healthcare — PHI protectionAdministrative, physical, and technical safeguards required
GDPREU — personal data protection72-hour breach notification; right to erasure; data minimisation
SOC 2AICPA — service org controls audit5 Trust Service Criteria: Security, Availability, Integrity, Confidentiality, Privacy
MITRE ATT&CKAdversary tactics and techniques matrixTTPs mapped to real threat actors; used for threat hunting
Cyber Kill ChainLockheed Martin 7-phase attack modelRecon → Weaponise → Deliver → Exploit → Install → C2 → Act
OWASP Top 10Web application security risksTop risks: Broken Access Control, Injection, Crypto Failures
📶 Wireless Security
ProtocolEncryptionAuthStatusExam Note
WEPRC4 (40-bit)Shared keyBrokenCrackable in minutes — never use
WPATKIP (RC4)PSK / EnterpriseDeprecatedTKIP is weak — replaced by WPA2
WPA2-PersonalAES-CCMPPSKAcceptableVulnerable to PMKID attack; minimum standard
WPA2-EnterpriseAES-CCMP802.1X / RADIUSRecommendedPer-user auth — much stronger than PSK
WPA3-PersonalAES-GCMP-256SAECurrent StandardSAE replaces PSK — forward secrecy, offline attack resistant
WPA3-EnterpriseAES-GCMP-256802.1X / RADIUSStrongest192-bit mode available; required for high-security environments

Wireless Attacks

  • Evil Twin Rogue AP mimics legitimate SSID
  • Deauth Attack Forces clients to reconnect (capture handshake)
  • PMKID Attack Cracks WPA2-Personal without handshake
  • WPS PIN Attack Brute forces 8-digit WPS PIN
  • Wardriving Scanning for open/weak Wi-Fi networks

Wireless Defences

  • WPA3-Enterprise Strongest option
  • Disable WPS Eliminates WPS PIN attack
  • 802.1X / RADIUS Per-user authentication
  • WIDS Wireless Intrusion Detection
  • Site survey Detect rogue APs
📖 Key Acronyms
AcronymFull NameOne-Line Description
AAAAuthentication, Authorisation, AccountingSecurity services framework — RADIUS and TACACS+ implement AAA
ACLAccess Control ListOrdered rules permitting or denying traffic / access
APTAdvanced Persistent ThreatLong-term, targeted attack — often nation-state actors
BCPBusiness Continuity PlanKeeps operations running during and after a disaster
CIAConfidentiality, Integrity, AvailabilityThe three core security principles — every control maps to one
DLPData Loss PreventionPrevents sensitive data leaving the organisation
DRPDisaster Recovery PlanRestores IT systems after a disaster; subset of BCP
EDREndpoint Detection and ResponseAdvanced endpoint protection with behaviour analysis
FIMFile Integrity MonitoringAlerts when critical files are changed unexpectedly
HSMHardware Security ModuleDedicated hardware for cryptographic key storage
IOCIndicator of CompromiseEvidence of a breach — hashes, IPs, domains, registry keys
MFAMulti-Factor Authentication2+ factors from different categories (know/have/are)
MTDMaximum Tolerable DowntimeLongest acceptable outage before serious business impact
RBACRole-Based Access ControlAccess permissions tied to job roles, not individuals
RPORecovery Point ObjectiveMaximum data loss acceptable — drives backup frequency
RTORecovery Time ObjectiveMaximum time to restore a system after failure
SIEMSecurity Information & Event ManagementAggregates and correlates logs for threat detection
SOCSecurity Operations CentreTeam monitoring and responding to security events 24/7
TTPTactics, Techniques, and ProceduresHow attackers operate — mapped in MITRE ATT&CK
XDRExtended Detection and ResponseEDR extended across network, cloud, email — unified view
RPO vs RTO exam trap: RPO = how much data you can afford to lose (drives backup schedule). RTO = how fast you need to recover (drives DR infrastructure investment). MTD = the absolute maximum downtime before the business fails — RTO must be less than MTD.

Ready to Pass Security+?

See the best study resources, practice exams, and courses for the SY0-701 exam.

View Security+ Resources →