Domain 4 of 5

Security Operations (28%)

Domain 4: Security Operations

Exam Weight: 28% | Largest weighted domain - expect many questions!


Domain Overview

Domain 4 is the largest on the exam, covering the day-to-day activities of security operations. This includes hardening systems, managing assets and vulnerabilities, monitoring for threats, implementing identity management, automating security tasks, and responding to incidents. Mastering this domain is essential for exam success.


Learning Objectives

After completing this domain, you should be able to:


Lessons in This Domain

| Lesson | Topic | Objectives Covered |

|--------|-------|-------------------|

| 01_security_techniques.md | Security Techniques and Hardening | 4.1 |

| 02_asset_management.md | Asset Management | 4.2 |

| 03_vulnerability_management.md | Vulnerability Management | 4.3 |

| 04_monitoring.md | Security Monitoring | 4.4 |

| 05_enterprise_capabilities.md | Enterprise Security Capabilities | 4.5 |

| 06_iam.md | Identity and Access Management | 4.6 |

| 07_automation.md | Automation and Orchestration | 4.7 |

| 08_incident_response.md | Incident Response | 4.8 |

| 09_investigations.md | Security Investigations | 4.9 |


Key Concepts at a Glance

Hardening Targets

| Target | Key Actions |

|--------|-------------|

| Workstations | Remove bloatware, disable unnecessary services, apply baseline |

| Servers | Minimize roles, secure ports, implement logging |

| Mobile | MDM enrollment, encryption, remote wipe capability |

| Network Devices | Change defaults, disable unused ports, secure management |

| IoT | Segment network, change credentials, update firmware |

Vulnerability Management Lifecycle

Identification → Analysis → Response → Validation
     ↓              ↓           ↓           ↓
  Scanning      CVE/CVSS    Patching    Rescanning
  Threat feeds  Risk rating  Mitigation  Verification
  Pentesting    Prioritize   Accept      Audit

Incident Response Phases

  1. Preparation: Policies, procedures, tools, training
  2. Detection: Alerts, monitoring, threat intelligence
  3. Analysis: Triage, scope determination
  4. Containment: Isolate, preserve evidence
  5. Eradication: Remove threat
  6. Recovery: Restore systems
  7. Lessons Learned: Post-incident review

IAM Concepts

| Concept | Description |

|---------|-------------|

| Authentication | Verify identity (who are you?) |

| Authorization | Grant access (what can you do?) |

| Accounting | Track actions (what did you do?) |

| Federation | Trust between domains |

| SSO | Single authentication for multiple systems |

| MFA | Multiple authentication factors |


Exam Tips for Domain 4

⚠️ High-Priority Topics:

⚠️ Common Exam Traps:

⚠️ Scenario Question Strategy:

For incident response scenarios:

  1. What phase are they in?
  2. What actions are appropriate for that phase?
  3. What evidence needs to be preserved?
  4. Who needs to be notified?

Study Checklist

Objective 4.1: Security Techniques

Objective 4.2: Asset Management

Objective 4.3: Vulnerability Management

Objective 4.4: Monitoring

Objective 4.5: Enterprise Capabilities

Objective 4.6: Identity and Access Management

Objective 4.7: Automation

Objective 4.8: Incident Response

Objective 4.9: Investigations


Quick Reference: CVSS Scoring

| Score | Severity |

|-------|----------|

| 0.0 | None |

| 0.1-3.9 | Low |

| 4.0-6.9 | Medium |

| 7.0-8.9 | High |

| 9.0-10.0 | Critical |

Quick Reference: Authentication Factors

| Factor | Type | Examples |

|--------|------|----------|

| Something you know | Knowledge | Password, PIN |

| Something you have | Possession | Smart card, token, phone |

| Something you are | Inherence | Fingerprint, face, iris |

| Somewhere you are | Location | Geolocation, IP address |

| Something you do | Behavior | Typing pattern, gait |


External Resources


Continue to Lesson 1: Security Techniques →

← Previous Domain 4 of 5 Next →