Course Details
Course Outline
1 - Comparing Security Roles and Controls
Topic 1A: Compare and Contrast Information Security RolesTopic 1B: Compare and Contrast Security Control and Framework Types
2 - Explaining Threat Actors and Threat Intelligence
Topic 2A: Explain Threat Actor Types and Attack Vectors
3 - Performing Security Assessments
Topic 3A: Assess Organizational Security with Network Reconnaissance ToolsTopic 3B: Explain Security Concerns with General Vulnerability TypesTopic 3C: Summarize Vulnerability Scanning TechniquesTopic 3D: Explain Penetration Testing Concepts
4 - Identifying Social Engineering and Malware
Topic 4A: Compare and Contrast Social Engineering TechniquesTopic 4B: Analyze Indicators of Malware-Based Attacks
5 - Summarizing Basic Cryptographic Concepts
Topic 5A: Compare and Contrast Cryptographic CiphersTopic 5B: Summarize Cryptographic Modes of OperationTopic 5C: Summarize Cryptographic Use Cases and WeaknessesTopic 5D: Summarize Other Cryptographic Technologies
6 - Implementing Public Key Infrastructure
Topic 6A: Implement Certificates and Certificate AuthoritiesTopic 6B: Implement PKI Management
7 - Implementing Authentication Controls
Topic 7A: Summarize Authentication Design ConceptsTopic 7B: Implement Knowledge-Based AuthenticationTopic 7C: Implement Authentication TechnologiesTopic 7D: Summarize Biometrics Authentication Concepts
8 - Implementing Identity and Account Management Controls
Topic 8A: Implement Identity and Account TypesTopic 8B: Implement Account PoliciesTopic 8C: Implement Authorization SolutionsTopic 8D: Explain the Importance of Personnel Policies
9 - Implementing Secure Network Designs
Topic 9A: Implement Secure Network DesignsTopic 9B: Implement Secure Switching and RoutingTopic 9C: Implement Secure Wireless InfrastructureTopic 9D: Implement Load Balancers
10 - Implementing Network Security Appliances
Topic 10A: Implement Firewalls and Proxy ServersTopic 10B: Implement Network Security MonitoringTopic 10C: Summarize the Use of SIEM
11 - Implementing Secure Network Protocols
Topic 11A: Implement Secure Network Operations ProtocolsTopic 11B: Implement Secure Application ProtocolsTopic 11C: Implement Secure Remote Access Protocols
12 - Implementing Host Security Solutions
Topic 12A: Implement Secure FirmwareTopic 12B: Implement Endpoint SecurityTopic 12C: Explain Embedded System Security Implications
13 - Implementing Secure Mobile Solutions
Topic 13A: Implement Mobile Device ManagementTopic 13B: Implement Secure Mobile Device Connections
14 - Summarizing Secure Application Concepts
Topic 14A: Analyze Indicators of Application AttacksTopic 14B: Analyze Indicators of Web Application AttacksTopic 14C: Summarize Secure Coding PracticesTopic 14D: Implement Secure Script EnvironmentsTopic 14E: Summarize Deployment and Automation Concepts
15 - Implementing Secure Cloud Solutions
Topic 15A: Summarize Secure Cloud and Virtualization ServicesTopic 15B: Apply Cloud Security SolutionsTopic 15C: Summarize Infrastructure as Code Concepts
16 - Explaining Data Privacy and Protection Concepts
Topic 16A: Explain Privacy and Data Sensitivity ConceptsTopic 16B: Explain Privacy and Data Protection Controls
17 - Performing Incident Response
Topic 17A: Summarize Incident Response ProceduresTopic 17B: Utilize Appropriate Data Sources for Incident ResponseTopic 17C: Apply Mitigation Controls
18 - Explaining Digital Forensics
Topic 18A: Explain Key Aspects of Digital Forensics DocumentationTopic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
19 - Summarizing Risk Management Concepts
Topic 19A: Explain Risk Management Processes and Concepts
20 - Implementing Cybersecurity Resilience
Topic 20A: Implement Redundancy StrategiesTopic 20B: Implement Backup StrategiesTopic 20C: Implement Cybersecurity Resiliency Strategies
21 - Explaining Physical Security
Topic 21A: Explain the Importance of Physical Site Security ControlsTopic 21B: Explain the Importance of Physical Host Security Controls
Actual course outline may vary depending on offering center. Contact your sales representative for more information.