Week 7  45 pages and 30 multiple choice questions
Read Chapter 16, 17 and 18 again
Chapter 19  – Given a scenario, implement and maintain identity and access management – 23 pages

Chapter 20 – Explain the importance of automation and orchestration related to secure operations – 8 pages

Chapter 21 – Explain appropriate incident response activities – 14 pages

Action – Ian’s Book Key Elements
Chapter 19 – Read pages 331- 353 taking notesComplete all 10 review questions pages 354-356

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 20 – Read pages 357-365 taking notes

Complete all 10 review questions pages 364-366

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 21 – Read pages 365-378 taking notes

Complete all 10 review questions pages 379-381

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
https://www.professormesser.com/security-plus/sy0-701/sy0-701-video/sy0-701-comptia-security-plus-course/

4.6 Identity and access management

  • Identity and access management
  • Access controls
  • Multifactor authentication
  • Password security

4.7 Automation and Orchestration

  • Scripting and automation

4.8 Incident response

  • Incident response
  • Incident planning
  • Digital forensics
Action – Lab Exercises (optional) 

Action – Lab Exercises (optional) 101 Labs – click Security+

Conducting a dictionary attack to crack online passwords using Hydra

How to crack passwords with Hashcat

CompTIA Security+ – 101Labs.net

  • then click on Security+

Ian’s Website
Lab 5 – Capturing a Packet Using Wireshark
Lab 7 – Command Line Tools
Labs | Ian Neil’s Security+ Study Materials (securityplus.training)
Video
Warriors of the Net
Internet of Things

Provisioning/de-provisioning users

Federation services

SSO

Attestation

Access controls

Multifactor authentication

Password concepts

Privilege access management

Automation and scripting

Automation benefits

Cost implications

Incident response process

Training

Tabletop exercises

Root cause analysis

Threat Hunting

Digital Forensics