Week 9 – 32 pages and 30 multiple choice questions
Read Chapters 22, 23 and 24 again
Chapter 25 – Explain the processes associated with third-party risk assessment and management – 7 pages

Chapter 26 – Summarize elements of effective security compliance – 8 pages

Chapter 27 – Explain types and purposes of audits and assessments – 7 pages

Chapter 28 – Given a scenario, implement security awareness practices – 10 pages

Action – Ian’s Book Key Elements
Chapter 25 – Read pages 429-435 taking notes

Complete all 10 review questions pages 436-438

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 26 – Read pages 439-446 taking notes

Complete all 10 review questions pages 447-449

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 27 – Read pages 451-457 taking notes

Complete all 10 review questions pages 458-460

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 28 – Read pages 461-470 taking notes

Complete all 10 review questions pages 471-473

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
https://www.professormesser.com/security-plus/sy0-701/sy0-701-video/sy0-701-comptia-security-plus-course/

5.3 Third party risk

  • Third party risk assessment
  • Agreement types

5,4 Security compliance

  • Compliance
  • Privacy

5.5 Audits and assessments

  • Audits and assessments
  • Penetration tests
  • 5.6 Security Awareness
  • Security Awareness
  • User training
Action – Lab Exercises (optional) 101 Labs
Hping for security auditing and testing of network devices

CompTIA Security+ – 101Labs.net

Vendor assessments

Vendor selection

Agreement types

Vendor monitoring

Questionnaires

Rules of engagment

Compliance reporting

Consequences of non-compliance

Compliance monitoring

Privacy

Attestation

Internal audits

External audits

Penetration testing

Phishing campaigns

Anomalous behavior recognition

Reporting and monitoring

Development and execution of security awareness training

Videos

Malicious USB Cable
Malicious USB Drive
DDoS Attack on Facebook
What’s Your Password?
How Private is Your Information
Bug Bounty Starter
Remote Jeep Attack
Exam Preparation | Ian Neil’s Security+ Study Materials (securityplus.training)
Default Passwords
Search for BT and Verizon
Default Passwords | CIRT.net
Security Cameras
https://www.a1securitycameras.com/blog/default-username-passwords-ip-addresses-for-surveillance-cameras/#How_can_A1_Security_Cameras_help_you