{"id":149,"date":"2022-09-26T13:22:48","date_gmt":"2022-09-26T13:22:48","guid":{"rendered":"http:\/\/resources.practicequiz.com\/the-new-comptia-security\/"},"modified":"2022-09-26T13:22:48","modified_gmt":"2022-09-26T13:22:48","slug":"the-new-comptia-security","status":"publish","type":"post","link":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/","title":{"rendered":"The New CompTIA Security+: SY0-401 vs. SY0-301"},"content":{"rendered":"<p>\n\tCompTIA, one of the leading vendor-neutral IT certification agencies has released an updated version of the Security+ exam, which focuses on how to keep a company&rsquo;s network and data secure. This update sees the usual pattern of adding more things for the IT professional to know, with very little material retired. The &ldquo;latest and greatest&rdquo; technologies and methods are added, with more emphasis is given to cloud computing, mobile devices, reflecting the continual rise in off-site and network-based security. We also see a focus shift towards procedures and followthrough, as well as incident review &#8211; all ways to maintain vigilance and evaluate efficacy, as the Information Security world becomes more complicated. One thing that hasn&rsquo;t changed is the requirements for the aspiring Security+ IT professional. This is in contrast to the recent A+ upgrade, which vastly increased the experience needed for candidates. To qualify for the Security+ exam, you still need:<\/p>\n<ul>\n<li>\n\t\t2 years of IT administration experience, focusing on security<\/li>\n<li>\n\t\t&rdquo;Day to day <i>technical<\/i> information security experience&quot;<\/li>\n<li>\n\t\t&rdquo;Broad knowledge&rdquo; of security risks, technologies, and methods, such as those listed in the exam outline<\/li>\n<\/ul>\n<p>\n\tAnother thing that didn&rsquo;t change much is the distribution of weight for each domain:<\/p>\n<ol>\n<li>\n\t\tNetwork Security: 20% (<span style=\"color: #ff0000;\">-1%<\/span>)<\/li>\n<li>\n\t\tCompliance and Operational Security: 18% (0%)<\/li>\n<li>\n\t\tThreats and Vulnerabilities: 20% (<span style=\"color: #ff0000;\">-1%<\/span>)<\/li>\n<li>\n\t\tApplication, Data, and Host Security: 15% (<span style=\"color: #ff0000;\">-1%<\/span>)<\/li>\n<li>\n\t\tAccess Control and Identity Management: 15% (<span style=\"color: #339966;\">+2%<\/span>)<\/li>\n<li>\n\t\tCryptography: 12% (<span style=\"color: #339966;\">+1%<\/span>)<\/li>\n<\/ol>\n<p>\n\tBut don&rsquo;t be fooled, there is a <i>lot<\/i> of new material added! In the Acronym Glossary alone there are 76 new terms and only two retired terms (BOTS and LANMAN). There is also a whole new list of &ldquo;Suggested Classroom Equipment&rdquo; for Security+ training, which will be invaluable for teachers and self-studiers alike. Let&rsquo;s break down the changes domain by domain, shall we?<\/p>\n<h2>\n\t1.0 Network Security<\/h2>\n<p>\n\t<b>1.1: Implement security configuration parameters on network devices and other technologies.<\/b> Candidates are now expected to implement security configuration parameters on Application Aware Devices, including:<\/p>\n<ul>\n<li>\n\t\tFirewalls,<\/li>\n<li>\n\t\tIPS,<\/li>\n<li>\n\t\tIDS, and<\/li>\n<li>\n\t\tProxies<\/li>\n<\/ul>\n<p>\n\t<b>1.2: Given a scenario, use secure network administration principles <\/b> Unified Threat Management replaces &ldquo;Al in One&rdquo; Security applications that candidates should know their network administration principles for. <b>1.3: Explain network design elements and components<\/b> Of the network design elements and components a candidate should know, Layered Security \/ Defense in depth is added, as are several types of cloud computing:<\/p>\n<ul>\n<li>\n\t\tprivate,<\/li>\n<li>\n\t\tpublic,<\/li>\n<li>\n\t\thybrid,<\/li>\n<li>\n\t\tcommunity.<\/li>\n<\/ul>\n<p>\n\t<b>1.4: Given a scenario, implement common protocols and services<\/b> Also expanded is the list of protocols and services the candidate should be able to implement, now including:<\/p>\n<ul>\n<li>\n\t\tiSCSI,<\/li>\n<li>\n\t\tFibre Channel,<\/li>\n<li>\n\t\tFCoE,<\/li>\n<li>\n\t\tFTP,<\/li>\n<li>\n\t\tTFTP,<\/li>\n<li>\n\t\tTELNET,<\/li>\n<li>\n\t\tHTTP,<\/li>\n<li>\n\t\tNetBIOS, and<\/li>\n<li>\n\t\tOSI Relevance.<\/li>\n<\/ul>\n<p>\n\t<strong>1.5: Given a scenario, troubleshoot security issues related to wireless networking <\/strong> There are also more security issues to troubleshoot: Captive portals,<\/p>\n<ul>\n<li>\n\t\tantennae types site surveys, and<\/li>\n<li>\n\t\tVPN over open wireless.<\/li>\n<\/ul>\n<p>\n\t&nbsp; SSID Broadcast now also explicitly mentions disable.<\/p>\n<h2>\n\t2.0 : Compliance and Operational Security<\/h2>\n<p>\n\tThere is a lot of new material in this domain, a good but of rearranging of material, as well as an increased focus on scenario analysis. Most noticeably there are three whole new subdomains:<\/p>\n<ul>\n<li>\n<ul>\n<li>\n<ul>\n<li>\n\t\t\t\t\t\t2.2: &quot;Summarize the security implications of integrating systems and data with third parties,&rdquo;<\/li>\n<li>\n\t\t\t\t\t\t2.3: &quot;Given a scenario, implement appropriate risk mitigation strategies&quot;&nbsp;and<\/li>\n<li>\n\t\t\t\t\t\t2.9: &quot;Given a scenario, select the appropriate control to meet the goals of security&rdquo;.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n\t<strong>2.1 Explain the importance of risk related concepts.<\/strong> New risk related concepts to explain are:<\/p>\n<ul>\n<li>\n<ul>\n<li>\n<ul>\n<li>\n\t\t\t\t\t\tFalse negatives,<\/li>\n<li>\n\t\t\t\t\t\tSLE, ARO, MTTR, MTTF, MTBF Risk calculations,<\/li>\n<li>\n\t\t\t\t\t\tVulnerabilities,<\/li>\n<li>\n\t\t\t\t\t\tThreat Vectors, and<\/li>\n<li>\n\t\t\t\t\t\tRecovery time objective and recovery point objective.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n\t<strong><span style=\"color: #3366ff;\">(New)<\/span> 2.2: Summarize the security implications of integrating systems and data with third parties<\/strong> This subdomain focuses on security considerings of working with business parters and social media, which is increasingly crucial as the internet becomes even more interconnected and integrated with APIs and cross-platform interoperability. Besides the basic &ldquo;privacy considerations&rdquo;, &ldquo;risk awareness&rdquo;, and &ldquo;data ownership&rdquo;, this subdomain also focuses on indifferent types of interoperability agreements (SLA, PBA, MOU, and ISA), and also following &ldquo;security policy and procedures&rdquo; and reminding candidates to &ldquo;review agreement requirements and verify compliance and performance standards.&rdquo; Good stuff. <strong><span style=\"color: #3366ff;\">(New) <\/span>2.3: Given a scenario, implement appropriate risk mitigation strategies<\/strong> (Was 2.2 in SY0-301) on risk mitigation is now emphasized as &ldquo;Given a scenario&hellip;&rdquo; and now includes enforcing technology controls, including Data Loss Prevention (DLP) <strong>2.4: Given a scenario, implement basic forensic procedures<\/strong> Forensic procedures (from 301&rsquo;s 2.3) has been broken out into its own subdomain, again scenario based. The only new procedure added however, is &ldquo;Big Data analysis&rdquo; <strong>2.5: Summarize common incident response procedures<\/strong> This section has the non-forensic procedures from 301&rsquo;s 2.3, and expands them to include<\/p>\n<ul>\n<li>\n\t\tPreparation<\/li>\n<li>\n\t\tIncident Identification<\/li>\n<li>\n\t\tEscalation and notification<\/li>\n<li>\n\t\tMitigation steps<\/li>\n<li>\n\t\tLessons learned<\/li>\n<li>\n\t\tReporting<\/li>\n<li>\n\t\tRecovery\/reconstitution procedures<\/li>\n<li>\n\t\tIncident isolation (quarantine and device removal), and<\/li>\n<li>\n\t\tData breach<\/li>\n<\/ul>\n<p>\n\t<strong>2.6: Explain the importance of security related awareness and training<\/strong> This is the same subdomain as 2.5 in 301, expanded to include:<\/p>\n<ul>\n<li>\n\t\tRole-based training<\/li>\n<li>\n\t\tMore types of information classification: High, medium, low, confidential, private, and public (previously: hard and soft)<\/li>\n<li>\n\t\tFollow up and gather training metrics to validate compliance and security posture<\/li>\n<\/ul>\n<p>\n\t<strong>2.7: Compare and contrast physical security and environmental controls.<\/strong> This merges what was subdomains 2.6 (environmental controls) and 3.6 (physical security) in SY0-301, and also expands on the types of physical security the candidate should be familiar with to include:<\/p>\n<ul>\n<li>\n\t\tProper lighting<\/li>\n<li>\n\t\tSigns<\/li>\n<li>\n\t\tGuards<\/li>\n<li>\n\t\tBarricades<\/li>\n<li>\n\t\tBiometrics<\/li>\n<li>\n\t\tProtected distribution (Cabling)<\/li>\n<li>\n\t\tAlarms<\/li>\n<li>\n\t\tMotion Detection<\/li>\n<\/ul>\n<p>\n\tAlso new are Control Types, including<\/p>\n<ul>\n<li>\n\t\tDeterrent<\/li>\n<li>\n\t\tPreventative<\/li>\n<li>\n\t\tDetective<\/li>\n<li>\n\t\tCompensating<\/li>\n<li>\n\t\tTechnical<\/li>\n<li>\n\t\tAdministrative<\/li>\n<\/ul>\n<p>\n\t<strong>2.8: Summarize risk management best practices.<\/strong> This section combines 2.5 (business continuity) and 2.7 (disaster recovery) from 301, though there is not much change, only two new business continuity concepts:<\/p>\n<ul>\n<li>\n\t\tIdentification of critical systems and components<\/li>\n<li>\n\t\tTabletop exercises<\/li>\n<\/ul>\n<p>\n\t<strong><span style=\"color: #3366ff;\">(New)<\/span> 2.9: Given a scenario, select the appropriate control to meet the goals of security.<\/strong> This is a whole new subdomain added for 401, and has four major components:<\/p>\n<ul>\n<li>\n\t\tConfidentiality: Encryption, access controls, and steganography<\/li>\n<li>\n\t\tIntegrity: Hashing, digital signatures, certificates, and non-repudiation<\/li>\n<li>\n\t\tAvailability: Redundancy, fault tolerance, patching<\/li>\n<li>\n\t\tSafety: Fencing, lighting, locks, CCTV, escape plans, drills, escape rotes, and testing controls.<\/li>\n<\/ul>\n<h2>\n\t3.0: Threats and Vulnerabilities<\/h2>\n<p>\n\tThere is some minor additions to this domain, focusing on new types of popular attacks, but it remains primarily the same. <strong>3.1: Explain types of malware <\/strong>New malware to be aware of:<\/p>\n<ul>\n<li>\n\t\tRansomware<\/li>\n<li>\n\t\tPolymorphic malware<\/li>\n<li>\n\t\tArmored virus<\/li>\n<\/ul>\n<p>\n\t<strong>3.2: Summarize various types of attacks <\/strong><span style=\"line-height: 1.714285714; font-size: 1rem;\">Several types of password attacks are added, including <\/span><\/p>\n<ul>\n<li>\n\t\tBrute force attacks<\/li>\n<li>\n\t\tdictionary attacks<\/li>\n<li>\n\t\thybrid<\/li>\n<li>\n\t\tBirthday attacks<\/li>\n<li>\n\t\tRainbow tables<\/li>\n<\/ul>\n<p>\n\t&nbsp; Also new are &ldquo;Typo squatting\/URL hijacking&rdquo; and &ldquo;Watering hole attack&rdquo; <strong>3.3:. Summarize social engineering attacks and the associated effectiveness with each attack <\/strong>Candidates now have to know the reasons for attack effectiveness, called, &ldquo;Principles&rdquo;, including:<\/p>\n<ul>\n<li>\n\t\tAuthority<\/li>\n<li>\n\t\tIntimidation<\/li>\n<li>\n\t\tConsensus\/Social proof<\/li>\n<li>\n\t\tScarcity<\/li>\n<li>\n\t\tUrgency<\/li>\n<li>\n\t\tFamiliarity\/liking<\/li>\n<li>\n\t\tTrust<\/li>\n<\/ul>\n<p>\n\t<strong>3.4: Explain types of wireless attacks <\/strong>New ones here are:<\/p>\n<ul>\n<li>\n\t\tJamming<\/li>\n<li>\n\t\tNew field communication<\/li>\n<li>\n\t\tReplay attacks<\/li>\n<li>\n\t\tWEP\/WPA attacks<\/li>\n<li>\n\t\tWPS attacks<\/li>\n<\/ul>\n<p>\n\t<strong>3.5: Explain types of application attacks <\/strong>Added for 401 are:<\/p>\n<ul>\n<li>\n\t\tInteger overflow<\/li>\n<li>\n\t\tLSO (locally shared objects)<\/li>\n<li>\n\t\tFlash Cookies<\/li>\n<li>\n\t\tArbitrary code execution \/ remote code execution<\/li>\n<\/ul>\n<p>\n\t<strong>3.6: Analyze a scenario and select the appropriate type of mitigation and deterrent techniques. <\/strong>Physical security has been moved up to section 2.7, and &quot;Manual bypassing of electronic controls&rdquo; has been removed entirely. Newly added in &ldquo;Network Security&rdquo; are<\/p>\n<ul>\n<li>\n\t\tDisabling unused interfaces, and<\/li>\n<li>\n\t\tRogue machine detection<\/li>\n<\/ul>\n<p>\n\t<strong>3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities. <\/strong>Again a focus on scenario questions. Sniffers are gone from the list of tools, but &ldquo;Passive vs. active tools&rdquo; is new. <strong>3.8: Explain the proper use of penetration testing versus vulnerability scanning. <\/strong>Newly added to vulnerability scanning are<\/p>\n<ul>\n<li>\n\t\tIntrusive vs. non-intrusive<\/li>\n<li>\n\t\tcredentials vs. non-credentials<\/li>\n<li>\n\t\tFalse positive<\/li>\n<li>\n\t\tApplication, Data, and Host Security<\/li>\n<\/ul>\n<h2>\n\t&nbsp;<\/h2>\n<h2>\n\t4.0: Application, Data and Host Security<\/h2>\n<p>\n\tMobile (4.2) makes its broadway debut here, having been merely a brief sub-section of a subdomain in 301. Also expanded are virtualization and cloud\/&ldquo;big data&rdquo; concerns. Also &nbsp;new is a subdomain on security risks in static environments. (4.5) <strong>4.1: Explain the importance of application security controls and techniques <\/strong>New here:<\/p>\n<ul>\n<li>\n\t\tNoSQL databases vs. SQL databases<\/li>\n<li>\n\t\tServer-side vs. Client-side validation<\/li>\n<\/ul>\n<p>\n\t<strong><span style=\"color: #3366ff;\">(New)<\/span> 4.2: Summarize mobile security concepts and technologies <\/strong>Too many to list here, so go review this section in the <a href=\"http:\/\/http:\/\/certification.comptia.org\/Training\/testingcenters\/examobjectives.aspx\" target=\"_blank\" title=\"Security+ Exam Objectives\" rel=\"noopener\">Exam Objectives<\/a> (available in full, free from CompTIA), on pages 11 and 12. The main subsections are:<\/p>\n<ul>\n<li>\n\t\tDevice security (this section actually existed in 301 4.2, but is greatly expanded here)<\/li>\n<li>\n\t\tApplication Security<\/li>\n<li>\n\t\tBYOD (&ldquo;Bring Your Own Device&rdquo;) Concerns.<\/li>\n<\/ul>\n<p>\n\tMobile has become a huge part of how companies communicate and interact with their data that this section is critical to maintaining information security. <strong>4.3: Given a scenario, select the appropriate solution to establish host security. <\/strong>Lots of new stuff here:<\/p>\n<ul>\n<li>\n\t\tOS hardening<\/li>\n<li>\n\t\tWhite listing vs. black listing applications<\/li>\n<li>\n\t\tTrusted OS<\/li>\n<li>\n\t\tHost-based intrusion detection<\/li>\n<li>\n\t\tVirtualization considerations: Snapshots, Patch compatibility, host availability\/elasticity, Security control testing, sandboxing<\/li>\n<\/ul>\n<p>\n\t<strong>4.4: Implement the appropriate controls to ensure data security <\/strong>Data loss prevention has been moved to 2.3 and &ldquo;Cloud Computing&rdquo; has been focused to &ldquo;Cloud Storage.&quot; But here&#39;s what&#39;s been added for 401:<\/p>\n<ul>\n<li>\n\t\tSAN<\/li>\n<li>\n\t\tHandling Big Data<\/li>\n<li>\n\t\tData in-transit, Data at-rest, Data in-use<\/li>\n<li>\n\t\tPermissions<\/li>\n<li>\n\t\tData policies: wiping, disposing, retention, and storage<\/li>\n<\/ul>\n<p>\n\t<strong><span style=\"color: #3366ff;\">(New)<\/span> 4.5: Compare and contrast alternative methods to mitigate security risks in static environments. <\/strong>Another whole new section. Those static environments are:<\/p>\n<ul>\n<li>\n\t\tSCADA<\/li>\n<li>\n\t\tEmbedded (Printer, Smart TV, HVAC,<\/li>\n<li>\n\t\tAndroid and iOS<\/li>\n<li>\n\t\tMainframe<\/li>\n<li>\n\t\tGame consoles<\/li>\n<li>\n\t\tIn-vehicle computing systems<\/li>\n<\/ul>\n<p>\n\tAnd the methods are:<\/p>\n<ul>\n<li>\n\t\tNetwork segmentation<\/li>\n<li>\n\t\tSecurity layers<\/li>\n<li>\n\t\tApplication firewalls<\/li>\n<li>\n\t\tManual updates<\/li>\n<li>\n\t\tFirmware version control<\/li>\n<li>\n\t\tWrappers<\/li>\n<li>\n\t\tControl redundancy and diversity<\/li>\n<\/ul>\n<h2>\n\t5.0 Access Control and Identity Management<\/h2>\n<p>\n\tSome new stuff here, but no major changes <strong>5.1: Compare and contrast the functions and purposes of authentication services. <\/strong>TACACS is now only TACACS+ And freshly added are:<\/p>\n<ul>\n<li>\n\t\tSAML<\/li>\n<li>\n\t\tSecure LDAP<\/li>\n<\/ul>\n<p>\n\t<strong>5.2: Given a scenario, select the appropriate authentication, authorization, or access control. <\/strong>Again we see that increased scenario focus.&nbsp;New authentication protocols are:<\/p>\n<ul>\n<li>\n\t\tTOTP<\/li>\n<li>\n\t\tHOTP<\/li>\n<li>\n\t\tCHAP<\/li>\n<li>\n\t\tPAP<\/li>\n<li>\n\t\tAuthentication Factors: Something you are, something you have, something you know, somewhere you are, and something you do.<\/li>\n<li>\n\t\tUsername is now explicitly mentioned as a type of Identification<\/li>\n<li>\n\t\tFederation<\/li>\n<li>\n\t\tTransitive trust\/authentication<\/li>\n<\/ul>\n<p>\n\t<strong>5.3: Install and configure security controls when performing account management, best on best practices. <\/strong>New types of account policy enforcement:<\/p>\n<ul>\n<li>\n\t\tCredential management<\/li>\n<li>\n\t\tGroup policy<\/li>\n<li>\n\t\tPassword history<\/li>\n<li>\n\t\tPassword reuse<\/li>\n<li>\n\t\tGeneric account prohibition<\/li>\n<\/ul>\n<p>\n\tAlso new:<\/p>\n<ul>\n<li>\n\t\tUser access reviews<\/li>\n<li>\n\t\tContinuous monitoring<\/li>\n<\/ul>\n<h2>\n\t6.0 Cryptography<\/h2>\n<p>\n\tThe home stretch! Again, not too much new here, just some expansion to keep pace with new crypto technologies. <strong>6.1: Given a scenario, utilize general cryptography concepts <\/strong>New stuff:<\/p>\n<ul>\n<li>\n\t\tSession keys<\/li>\n<li>\n\t\tIn-band vs. out-of-band key exchange<\/li>\n<li>\n\t\tEphemeral key<\/li>\n<li>\n\t\tPerfect forward secrecy<\/li>\n<\/ul>\n<p>\n\t<strong>6.2: Given a scenario, use appropriate cryptographic methods. <\/strong>The new ones here:<\/p>\n<ul>\n<li>\n\t\tDiffie-Hellman<\/li>\n<li>\n\t\tDHE<\/li>\n<li>\n\t\tECDHE<\/li>\n<li>\n\t\tCipher suites: strong v. weak ciphers<\/li>\n<li>\n\t\tKey streching: PBKDF2, Bcrypt<\/li>\n<li>\n\t\tWhole disc encryption is no longer on the list<\/li>\n<\/ul>\n<p>\n\t<strong>6.3 Given a scenario, use appropriate PKI certificate management and associated components. <\/strong>Just a couple of new certificate types here:<\/p>\n<ul>\n<li>\n\t\tOSCP<\/li>\n<li>\n\t\tCSR<\/li>\n<\/ul>\n<p>\n\t&nbsp; Congrats! You&#39;ve made it to the end of the the list of changes. Looking to start studying now? Check out PracticeQuiz&#39;s &nbsp;<a href=\"http:\/\/www.practicequiz.com\/CompTIA-Security+-Exam-Prep\" title=\"CompTIA Security+ Free Test Prep Questions\">CompTIA Security+ free test prep questions<\/a>. <strong>Bonus section: <\/strong>Here are the new need-to-know acronyms. Just a quick list &#8211; if you don&rsquo;t recognize any in an information security context, look them up! API,ASP, BAC, BIA, BPA, BYOD, CAPTCHA, CAR, CIO, COOP, CP, CSR, CSU, CTO, DBA, DES, DHE, DNAT, DSL, DSU, ECDHE, ESN, FDE, FTPS, GPG, GPO, GPS, HTML, IDS, IR, IRP, ISA, ISSO, ITCP, JBOD, LAN, MaaS, MPLS, MTBF, MTTR, MTTF, NDA, NFC, OSCP, OLA, P2P, PAC, PAM, PBKDF2, PCAP, PIV, RC4, RIPEMD, RPO, SAML, SAN, SCADA, SCEP, SEH, SFTP, SIEM, SOAP, TGT, TOTP, TSIG, UEFI, UDP, URI, UTM, VDI, WPA2, WPS, WTLS<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CompTIA, one of the leading vendor-neutral IT certification agencies has released an updated version of the Security+ exam, which focuses on how to keep a company&rsquo;s network and data secure. This update sees the usual pattern of adding more things for the IT professional to know, with very little material retired. The &ldquo;latest and greatest&rdquo; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-149","post","type-post","status-publish","format-standard","hentry","category-it_technical"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The New CompTIA Security+: SY0-401 vs. SY0-301 - PracticeQuiz.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The New CompTIA Security+: SY0-401 vs. SY0-301 - PracticeQuiz.com\" \/>\n<meta property=\"og:description\" content=\"CompTIA, one of the leading vendor-neutral IT certification agencies has released an updated version of the Security+ exam, which focuses on how to keep a company&rsquo;s network and data secure. This update sees the usual pattern of adding more things for the IT professional to know, with very little material retired. The &ldquo;latest and greatest&rdquo; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PracticeQuiz.com\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-26T13:22:48+00:00\" \/>\n<meta name=\"author\" content=\"ivan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ivan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/\",\"url\":\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/\",\"name\":\"The New CompTIA Security+: SY0-401 vs. SY0-301 - PracticeQuiz.com\",\"isPartOf\":{\"@id\":\"https:\/\/practicequiz.com\/resources\/#website\"},\"datePublished\":\"2022-09-26T13:22:48+00:00\",\"dateModified\":\"2022-09-26T13:22:48+00:00\",\"author\":{\"@id\":\"https:\/\/practicequiz.com\/resources\/#\/schema\/person\/bf25fc08fecc2c3714da43c5e08ac1df\"},\"breadcrumb\":{\"@id\":\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/practicequiz.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The New CompTIA Security+: SY0-401 vs. SY0-301\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/practicequiz.com\/resources\/#website\",\"url\":\"https:\/\/practicequiz.com\/resources\/\",\"name\":\"PracticeQuiz.com\",\"description\":\"PracticeQuiz.com free exam preparation.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/practicequiz.com\/resources\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/practicequiz.com\/resources\/#\/schema\/person\/bf25fc08fecc2c3714da43c5e08ac1df\",\"name\":\"ivan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/practicequiz.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c33ce417b5facddecb7ab34be4d720962228ba2754ccbe976af7c139503fb446?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c33ce417b5facddecb7ab34be4d720962228ba2754ccbe976af7c139503fb446?s=96&d=mm&r=g\",\"caption\":\"ivan\"},\"sameAs\":[\"http:\/\/resources.practicequiz.com\"],\"url\":\"https:\/\/practicequiz.com\/resources\/author\/ivan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The New CompTIA Security+: SY0-401 vs. SY0-301 - PracticeQuiz.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/","og_locale":"en_US","og_type":"article","og_title":"The New CompTIA Security+: SY0-401 vs. SY0-301 - PracticeQuiz.com","og_description":"CompTIA, one of the leading vendor-neutral IT certification agencies has released an updated version of the Security+ exam, which focuses on how to keep a company&rsquo;s network and data secure. This update sees the usual pattern of adding more things for the IT professional to know, with very little material retired. The &ldquo;latest and greatest&rdquo; [&hellip;]","og_url":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/","og_site_name":"PracticeQuiz.com","article_published_time":"2022-09-26T13:22:48+00:00","author":"ivan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ivan","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/","url":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/","name":"The New CompTIA Security+: SY0-401 vs. SY0-301 - PracticeQuiz.com","isPartOf":{"@id":"https:\/\/practicequiz.com\/resources\/#website"},"datePublished":"2022-09-26T13:22:48+00:00","dateModified":"2022-09-26T13:22:48+00:00","author":{"@id":"https:\/\/practicequiz.com\/resources\/#\/schema\/person\/bf25fc08fecc2c3714da43c5e08ac1df"},"breadcrumb":{"@id":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/practicequiz.com\/resources\/the-new-comptia-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/practicequiz.com\/resources\/"},{"@type":"ListItem","position":2,"name":"The New CompTIA Security+: SY0-401 vs. SY0-301"}]},{"@type":"WebSite","@id":"https:\/\/practicequiz.com\/resources\/#website","url":"https:\/\/practicequiz.com\/resources\/","name":"PracticeQuiz.com","description":"PracticeQuiz.com free exam preparation.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/practicequiz.com\/resources\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/practicequiz.com\/resources\/#\/schema\/person\/bf25fc08fecc2c3714da43c5e08ac1df","name":"ivan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/practicequiz.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c33ce417b5facddecb7ab34be4d720962228ba2754ccbe976af7c139503fb446?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c33ce417b5facddecb7ab34be4d720962228ba2754ccbe976af7c139503fb446?s=96&d=mm&r=g","caption":"ivan"},"sameAs":["http:\/\/resources.practicequiz.com"],"url":"https:\/\/practicequiz.com\/resources\/author\/ivan\/"}]}},"_links":{"self":[{"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/posts\/149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":0,"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/posts\/149\/revisions"}],"wp:attachment":[{"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/media?parent=149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/categories?post=149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/practicequiz.com\/resources\/wp-json\/wp\/v2\/tags?post=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}