SY0-701 Study Notes
Search
Search
Dark mode
Light mode
Explorer
Home
❯
Domain 4: Security Operations
❯
concepts
Folder: domain-4-security-operations/concepts
160 items under this folder.
Mar 20, 2026
Advisary emulation
domain/4
type/sub-topic
Mar 20, 2026
Anti-forensics
domain/4
type/sub-topic
Mar 20, 2026
Anti-phishing controls
domain/4
type/sub-topic
Mar 20, 2026
Antivirus / Anti-malware
domain/4
type/sub-topic
Mar 20, 2026
API integration
domain/4
type/sub-topic
Mar 20, 2026
Application whitelisting/allowlisting
domain/4
type/sub-topic
Mar 20, 2026
Attribute-Based Access Control (ABAC)
domain/4
type/sub-topic
Mar 20, 2026
Attribute mapping
domain/4
type/sub-topic
Mar 20, 2026
Automated response
domain/4
type/sub-topic
Mar 20, 2026
Automation
domain/4
type/sub-topic
Mar 20, 2026
Bandwidth monitoring
domain/4
type/sub-topic
Mar 20, 2026
Baseline-driven hunting
domain/4
type/sub-topic
Mar 20, 2026
Baseline establishment
domain/4
type/sub-topic
Mar 20, 2026
Behavioral analysis
domain/4
type/sub-topic
Mar 20, 2026
Benefits
domain/4
type/sub-topic
Mar 20, 2026
Boot integrity
domain/4
type/sub-topic
Mar 20, 2026
Break-glass accounts
domain/4
type/sub-topic
Mar 20, 2026
Bug bounty programs
domain/4
type/sub-topic
Mar 20, 2026
Business Email Compromise (BEC)
domain/4
type/sub-topic
Mar 20, 2026
Case management
domain/4
type/sub-topic
Mar 20, 2026
Centralized logging
domain/4
type/sub-topic
Mar 20, 2026
Chain of custody
domain/4
type/sub-topic
Mar 20, 2026
CIS Benchmarks
domain/4
type/sub-topic
Mar 20, 2026
Common SIEM platforms
domain/4
type/sub-topic
Mar 20, 2026
Communication plan
domain/4
type/sub-topic
Mar 20, 2026
Confidence levels
domain/4
type/sub-topic
Mar 20, 2026
Containment
domain/4
type/sub-topic
Mar 20, 2026
Continuous integration/deployment (CI/CD) security
domain/4
type/sub-topic
Mar 20, 2026
Continuous monitoring
domain/4
type/sub-topic
Mar 20, 2026
Correlation rules
domain/4
type/sub-topic
Mar 20, 2026
Credential rotation
domain/4
type/sub-topic
Mar 20, 2026
Credentialed vs. non-credentialed scans
domain/4
type/sub-topic
Mar 20, 2026
CVE (Common Vulnerabilities and Exposures)
domain/4
type/sub-topic
Mar 20, 2026
CVSS (Common Vulnerability Scoring System)
domain/4
type/sub-topic
Mar 20, 2026
Dashboards and reporting
domain/4
type/sub-topic
Mar 20, 2026
Data sources
domain/4
type/sub-topic
Mar 20, 2026
Detection and analysis
domain/4
type/sub-topic
Mar 20, 2026
Disable unnecessary services and ports
domain/4
type/sub-topic
Mar 20, 2026
Disk imaging
domain/4
type/sub-topic
Mar 20, 2026
DKIM (DomainKeys Identified Mail)
domain/4
type/sub-topic
Mar 20, 2026
DMARC (Domain-based Message Authentication, Reporting & Conformance)
domain/4
type/sub-topic
Mar 20, 2026
E-discovery
domain/4
type/sub-topic
Mar 20, 2026
Email encryption
domain/4
type/sub-topic
Mar 20, 2026
Eradication
domain/4
type/sub-topic
Mar 20, 2026
Exploitation
domain/4
type/sub-topic
Mar 20, 2026
False positives/negatives
domain/4
type/sub-topic
Mar 20, 2026
File system permissions
domain/4
type/sub-topic
Mar 20, 2026
Fileless malware detection
domain/4
type/sub-topic
Mar 20, 2026
Firmware updates
domain/4
type/sub-topic
Mar 20, 2026
Full disk encryption (FDE)
domain/4
type/sub-topic
Mar 20, 2026
Guardrails
domain/4
type/sub-topic
Mar 20, 2026
Hash verification
domain/4
type/sub-topic
Mar 20, 2026
Host-based firewall
domain/4
type/sub-topic
Mar 20, 2026
Host-based IDS/IPS (HIDS/HIPS)
domain/4
type/sub-topic
Mar 20, 2026
HOTP (HMAC-based One-Time Password)
domain/4
type/sub-topic
Mar 20, 2026
Hunt maturity model
domain/4
type/sub-topic
Mar 20, 2026
Hypothesis-driven hunting
domain/4
type/sub-topic
Mar 20, 2026
Identity governance
domain/4
type/sub-topic
Mar 20, 2026
Identity lifecycle management
domain/4
type/sub-topic
Mar 20, 2026
Identity Provider (IdP)
domain/4
type/sub-topic
Mar 20, 2026
Information Sharing and Analysis Centers (ISACs)
domain/4
type/sub-topic
Mar 20, 2026
Infrastructure as Code (IaC)
domain/4
type/sub-topic
Mar 20, 2026
Integration APIs
domain/4
type/sub-topic
Mar 20, 2026
Intelligence-driven hunting
domain/4
type/sub-topic
Mar 20, 2026
journald
domain/4
type/sub-topic
Mar 20, 2026
Just-in-time (JIT) access
domain/4
type/sub-topic
Mar 20, 2026
Least functionality principle
domain/4
type/sub-topic
Mar 20, 2026
Least privilege enforcement
domain/4
type/sub-topic
Mar 20, 2026
Legal hold
domain/4
type/sub-topic
Mar 20, 2026
Lessons learned / Post-incident review
domain/4
type/sub-topic
Mar 20, 2026
Live forensics vs. dead forensics
domain/4
type/sub-topic
Mar 20, 2026
Log aggregation
domain/4
type/sub-topic
Mar 20, 2026
Log forwarding agents
domain/4
type/sub-topic
Mar 20, 2026
Log integrity
domain/4
type/sub-topic
Mar 20, 2026
Log retention policies
domain/4
type/sub-topic
Mar 20, 2026
Log sources
domain/4
type/sub-topic
Mar 20, 2026
Metrics and reporting
domain/4
type/sub-topic
Mar 20, 2026
MFA fatigue attacks
domain/4
type/sub-topic
Mar 20, 2026
MITRE ATT&CK framework
domain/4
type/sub-topic
Mar 20, 2026
Mobile Device Management (MDM)
domain/4
type/sub-topic
Mar 20, 2026
NetFlow / sFlow / IPFIX
domain/4
type/sub-topic
Mar 20, 2026
Network-based IDS/IPS
domain/4
type/sub-topic
Mar 20, 2026
Network taps
domain/4
type/sub-topic
Mar 20, 2026
NIST IR lifecycle
domain/4
type/sub-topic
Mar 20, 2026
Normalization
domain/4
type/sub-topic
Mar 20, 2026
NTP synchronization
domain/4
type/sub-topic
Mar 20, 2026
OpenID Connect (OIDC)
domain/4
type/sub-topic
Mar 20, 2026
OpenID Connect
domain/4
type/sub-topic
Mar 20, 2026
Operational intelligence
domain/4
type/sub-topic
Mar 20, 2026
Orchestration
domain/4
type/sub-topic
Mar 20, 2026
Order of volatility
domain/4
type/sub-topic
Mar 20, 2026
Packet capture (PCAP)
domain/4
type/sub-topic
Mar 20, 2026
Password vaulting
domain/4
type/sub-topic
Mar 20, 2026
Patch management
domain/4
type/sub-topic
Mar 20, 2026
Phases
domain/4
type/sub-topic
Mar 20, 2026
Pivoting
domain/4
type/sub-topic
Mar 20, 2026
Playbooks/Runbooks
domain/4
type/sub-topic
Mar 20, 2026
Port mirroring (SPAN)
domain/4
type/sub-topic
Mar 20, 2026
Preparation
domain/4
type/sub-topic
Mar 20, 2026
Privileged accounts
domain/4
type/sub-topic
Mar 20, 2026
Protocol analysis
domain/4
type/sub-topic
Mar 20, 2026
Provisioning and deprovisioning
domain/4
type/sub-topic
Mar 20, 2026
Push notifications
domain/4
type/sub-topic
Mar 20, 2026
Real-time alerting
domain/4
type/sub-topic
Mar 20, 2026
Reconnaissance
domain/4
type/sub-topic
Mar 20, 2026
Recovery
domain/4
type/sub-topic
Mar 20, 2026
Red team vs. pen test
domain/4
type/sub-topic
Mar 20, 2026
Registry and GPO hardening
domain/4
type/sub-topic
Mar 20, 2026
Remediation vs. mitigation
domain/4
type/sub-topic
Mar 20, 2026
Remove default accounts and passwords
domain/4
type/sub-topic
Mar 20, 2026
Retention and archival
domain/4
type/sub-topic
Mar 20, 2026
Risk-based prioritization
domain/4
type/sub-topic
Mar 20, 2026
Risks
domain/4
type/sub-topic
Mar 20, 2026
Role-Based Access Control (RBAC)
domain/4
type/sub-topic
Mar 20, 2026
Root cause analysis
domain/4
type/sub-topic
Mar 20, 2026
Rules of engagement (ROE)
domain/4
type/sub-topic
Mar 20, 2026
SAML (Security Assertion Markup Language)
domain/4
type/sub-topic
Mar 20, 2026
SAML
domain/4
type/sub-topic
Mar 20, 2026
Scan scheduling
domain/4
type/sub-topic
Mar 20, 2026
Scripting languages
domain/4
type/sub-topic
Mar 20, 2026
Secure baseline images
domain/4
type/sub-topic
Mar 20, 2026
Secure email gateway
domain/4
type/sub-topic
Mar 20, 2026
Self-service capabilities
domain/4
type/sub-topic
Mar 20, 2026
Service account management
domain/4
type/sub-topic
Mar 20, 2026
Service Provider (SP)
domain/4
type/sub-topic
Mar 20, 2026
Session recording
domain/4
type/sub-topic
Mar 20, 2026
Single point of failure risk
domain/4
type/sub-topic
Mar 20, 2026
S/MIME
domain/4
type/sub-topic
Mar 20, 2026
SNMP (Simple Network Management Protocol)
domain/4
type/sub-topic
Mar 20, 2026
Something you are
domain/4
type/sub-topic
Mar 20, 2026
Something you do
domain/4
type/sub-topic
Mar 20, 2026
Something you have
domain/4
type/sub-topic
Mar 20, 2026
Something you know
domain/4
type/sub-topic
Mar 20, 2026
Somewhere you are
domain/4
type/sub-topic
Mar 20, 2026
SPF (Sender Policy Framework)
domain/4
type/sub-topic
Mar 20, 2026
STIG (Security Technical Implementation Guide)
domain/4
type/sub-topic
Mar 20, 2026
STIX (Structured Threat Information eXpression)
domain/4
type/sub-topic
Mar 20, 2026
Strategic intelligence
domain/4
type/sub-topic
Mar 20, 2026
Syslog
domain/4
type/sub-topic
Mar 20, 2026
Tabletop exercises
domain/4
type/sub-topic
Mar 20, 2026
Tactical intelligence
domain/4
type/sub-topic
Mar 20, 2026
TAXII (Trusted Automated eXchange of Intelligence Information)
domain/4
type/sub-topic
Mar 20, 2026
Technical intelligence
domain/4
type/sub-topic
Mar 20, 2026
Telemetry correlation (XDR)
domain/4
type/sub-topic
Mar 20, 2026
Testing types
domain/4
type/sub-topic
Mar 20, 2026
Threat actor profiling
domain/4
type/sub-topic
Mar 20, 2026
Threat containment
domain/4
type/sub-topic
Mar 20, 2026
Threat intelligence enrichment
domain/4
type/sub-topic
Mar 20, 2026
Threat intelligence integration
domain/4
type/sub-topic
Mar 20, 2026
Timeline analysis
domain/4
type/sub-topic
Mar 20, 2026
Token-based authentication
domain/4
type/sub-topic
Mar 20, 2026
TOTP (Time-based One-Time Password)
domain/4
type/sub-topic
Mar 20, 2026
Transitive trust
domain/4
type/sub-topic
Mar 20, 2026
Trust relationships
domain/4
type/sub-topic
Mar 20, 2026
Use cases
domain/4
type/sub-topic
Mar 20, 2026
User and Entity Behavior Analytics (UEBA)
domain/4
type/sub-topic
Mar 20, 2026
Vulnerability scanning
domain/4
type/sub-topic
Mar 20, 2026
Windows Event Log
domain/4
type/sub-topic
Mar 20, 2026
Write blockers
domain/4
type/sub-topic
Mar 20, 2026
WS-Federation
domain/4
type/sub-topic