Week 2 – 30 pages and 30 multiple choice questions
Read Chapters 1, 2 and 3 again
Chapter 4 – Explain the importance of using appropriate cryptographic solutions – 15 pages

Chapter 5 – Compare and contrast common threat actors and motivations – 6 pages

Chapter 6 – Explain common threat vectors and attack surfaces – 9 pages

Action – Ian’s Book Key Elements
Chapter 4 Read pages 43-57 taking notes
Complete all 10 review questions pages 58-60
Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 5 Read pages 63-69 taking notes

Complete all 10 review questions pages 70-72

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 6 Read pages 73-81 taking notes

Complete all 10 review questions pages 82-84

Any review questions that are wrong or missing then go back into the chapter and read those areas

Videos – Professor Messer

1.4 Cryptographic solutions

  • PKI
  • Encrypting Data
  • Key Exchange
  • Obfuscation
  • Hashing and Digital Signatures
  • Blockchain technology
  • Certificates

2.1 Threat actors

2.2 Phishing

  • Watering hole attack
  • Social Engineering

 

https://www.professormesser.com/security-plus/sy0-701/sy0-701-video/sy0-701-comptia-security-plus-course/

 

Ian’s Website
Lab 4 – How to steal certificates
PBQ – Certificates
Labs | Ian Neil’s Security+ Study Materials (securityplus.training)
PKI

Encryption

Tools

Obfuscation

Hashing

Salting

Digital signatures

Blockchain

Open public ledger

Certificates

Threat actors

Attributes of actors

Motivations of  threat actors

Message based attacks

Image based attacks

Voice Calls

Vulnerable software

Unsupported systems and applications

Unsecure networks

Open service ports

Default credentials

Supply chain

Social engineering