Course Outline

Module 1: Summarize

  • Lesson 1: Security Concepts
  • Lesson 2: Security Controls

Module 2: Compare Threat Types

  • Lesson 1: Threat Actors
  • Lesson 2: Attack Surfaces
  • Lesson 3: Social Engineering

Module 3: Explain Cryptographic Solutions

  • Lesson 1: Cryptographic Algorithms
  • Lesson 2: Public Key Infrastructure
  • Lesson 3: Cryptographic Solutions

Module 4: Implement Identity and Access Management

  • Lesson 1: Authentication
  • Lesson 2: Authorization
  • Lesson 3: Identity Management

Module 5: Secure Enterprise Network Architecture

  • Lesson 1: Enterprise Network Architecture
  • Lesson 2: Network Security Appliances
  • Lesson 3: Secure Communications

Module 6: Secure Cloud Network Architecture

  • Lesson 1: Cloud Infrastructure
  • Lesson 2: Embedded Systems and Zero Trust Architecture

Module 7: Explain Resiliency and Site Security Concepts

  • Lesson 1: Asset Management
  • Lesson 2: Redundancy Strategies
  • Lesson 3: Physical Security

Module 8: Explain Vulnerability Management

  • Lesson 1: Device and OS Vulnerabilities
  • Lesson 2: Application and Cloud Vulnerabilities
  • Lesson 3: Vulnerability Identification Methods
  • Lesson 4: Vulnerability Analysis and Remediation

Module 9: Evaluate Network Security Capabilities

  • Lesson 1: Network Security Baselines
  • Lesson 2: Network Security Capability Enhancement

Module 10: Assess Endpoint Security Capabilities

  • Lesson 1: Implement Endpoint Security
  • Lesson 2: Mobile Device Hardening

Module 11: Enhance Application Security Capabilities

  • Lesson 1: Application Protocol Security Baselines
  • Lesson 2: Cloud and Web Application Security Concepts

Module 12: Explain Incident Response and Monitoring Concepts

  • Lesson 1: Asset Management
  • Lesson 2: Redundancy Strategies
  • Lesson 3: Physical Security

Module 13: Analyze Indicators of Malicious Activity

  • Lesson 1: Malware Attack Indicators
  • Lesson 2: Physical and Network Attack Indicators
  • Lesson 3: Application Attack Indicators

Module 14: Summarize Security Governance Concepts

  • Lesson 1: Policies, Standards, and Procedures
  • Lesson 2: Change Management
  • Lesson 3: Automation and Orchestration

Module 15: Explain Risk Management Processes

  • Lesson 1: Risk Management Processes and Concepts
  • Lesson 2: Vendor Management Concepts
  • Lesson 3: Audits and Assessments

Module 16: Summarize Data Protection and Compliance

  • Lesson 1: Data Classification and Compliance
  • Lesson 2: Personnel Policies