Security+: Technologies and Tools – Load Balancer - Security Boulevard

Security+: Technologies and Tools – Load Balancer


The Security+ syllabus is updated every three years. Normally, the exam is denoted by a code consisting of a sequence of letters and numbers; for example, SY0-401 is the most recently outdated exam. During the revision, a number of changes are made from the previous to the most recent exam. This article covers the most recent changes leading to the current exam, SY0-501. We will cover the most recent changes related specifically to load balancers. We will take a look at how this is covered in the new exam and how it differs from the previous exam.

Exam Changes Overview

Between the two exams, SY0-401 and SY0-501, there is a significant overall change in content. The new exam focuses on attacks, risk management, and hands-on skills using technologies and tools. As a result, the domains have been re-named and re-ordered to reflect cybersecurity trends as determined in the Security+ SY0-501 Job Task Analysis (JTA).

Under the previous exam (SY0-401), load balancers were covered in the Network Security domain, specifically under section 1.1 Implement security configuration parameters on network devices and other technologies, which covered 20% of the overall exam, but is now found in the Technologies and Tools domain (22% of the overall exam), under section 2.2 Install and configure network components, both hardware and software-based, to support organizational security.

Compared to the previous exam, the new exam ensures that candidates are able to explain the learned concepts by translating them to real-life problems. This has been achieved by a 21% increase from the previous exam.

Exam Changes Comparison

A day in many large organizations with a large client base could see a tremendous amount of traffic streaming in from all around the world. How are such organizations able to handle such massive amounts of traffic without (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Chris Sienko. Read the original post at: