Exam Domains
Full study guide →General Security Concepts
This domain establishes the foundational security principles that underpin the entire Security+ exam. You'll need to understand the CIA triad, different types of security controls (technical, managerial, operational, physical), and when to apply each. Cryptographic concepts including symmetric and asymmetric encryption, hashing, and PKI are heavily tested here.
Threats, Vulnerabilities & Mitigations
The second-largest domain covers the threat landscape you'll face as a security professional. Expect questions on threat actor types (nation-state, hacktivist, insider), attack vectors (phishing, supply chain, network-based), and common vulnerabilities like SQL injection and cross-site scripting. You'll also need to know how to identify indicators of compromise and implement appropriate mitigations.
Security Architecture
Domain 3 focuses on designing and implementing secure infrastructure. You'll need to understand cloud security models (IaaS, PaaS, SaaS) and the shared responsibility model, network security concepts like segmentation and firewall types, and data protection strategies. Resilience concepts including high availability, backup strategies, and disaster recovery (RPO/RTO) are critical for this domain.
Security Operations
The largest domain covers day-to-day security operations. Topics include system hardening and secure baselines, vulnerability management (scanning, analysis, remediation), and security monitoring with SIEM and SOAR tools. You'll also need to understand identity and access management, endpoint security, and incident response procedures. This domain is where theory meets practice.
Security Program Management
Domain 5 covers the governance and management aspects of security. You'll need to understand risk management processes (identification, assessment, response), security policies and procedures, and compliance frameworks like NIST, ISO 27001, and PCI-DSS. Third-party risk management, security awareness training, and audit processes are also heavily tested in this domain.
Essential Acronyms
Authentication & Access
Cryptography
Network Security
Security Operations
Threats & Vulnerabilities
Compliance & Governance
Critical Ports
Key Frameworks
CIA Triad
Confidentiality + Integrity + Availability
Foundation of all security decisions
Risk Formula
Risk = Threat × Vulnerability × Impact
ALE = SLE × ARO
AAA Framework
Authentication → Authorization → Accounting
Who → What → When/Where
Incident Response
PICERL: Preparation → Identification → Containment → Eradication → Recovery → Lessons
Standard IR process
Zero Trust
Never Trust, Always Verify
Applies to internal users too
Defense in Depth
Physical → Network → Host → Application → Data
Layered security controls
Memory Aids
Control Categories
MOPT
Managerial, Operational, Physical, Technical
Control Types
PDDCCD
Preventive, Deterrent, Detective, Corrective, Compensating, Directive
Auth Factors
KHAW
Know, Have, Are, Where
Risk Response
AATM
Accept, Avoid, Transfer, Mitigate
Ready to test your knowledge?
Take our diagnostic assessment to identify gaps across all 5 domains and get a personalized study plan.
Create Study Plan