Course Outline
Part I: General Security Concepts
- Introduction (10 Questions)
- Control Categories
- Control Types
- Exam Preparation Tasks (10 Questions)
- Labs
- Introduction (10 Questions)
- Confidentiality, Integrity, and Availability (CIA)
- Non-repudiation
- Authentication, Authorization, and Accounting (AAA)
- Gap Analysis
- Zero Trust
- Physical Security
- Deception and Disruption Technology
- Exam Preparation Tasks (10 Questions)
- Labs
- Introduction (10 Questions)
- Business Processes Impacting Security Operations
- Technical Implications
- Documentation
- Version Control
- Exam Preparation Tasks (10 Questions)
- Introduction (17 Questions)
- Public Key Infrastructure (PKI)
- Encryption
- Transport/Communication
- Symmetric Versus Asymmetric Encryption
- Key Exchange
- Algorithms
- Key Length
- Tools
- Trusted Platform Module
- Hardware Security Module
- Key Management System
- Secure Enclave
- Obfuscation
- Steganography
- Hashing
- Salting
- Digital Signatures
- Key Stretching
- Blockchain
- Open Public Ledger
- Certificates
- Exam Preparation Tasks (10 Questions)
- Labs
Part II: Threats, Vulnerabilities, and Mitigations
- Introduction (10 Questions)
- Threat Actors
- Attributes of Actors
- Motivations
- War
- Exam Preparation Tasks (10 Questions)
- Introduction (10 Questions)
- Message-Based
- Image-Based
- File-Based
- Voice Call
- Removable Device
- Vulnerable Software
- Unsupported Systems and Applications
- Unsecure Networks
- Open Service Ports
- Default Credentials
- Supply Chain
- Human Vectors/Social Engineering
- Exam Preparation Tasks (10 Questions)
- Labs (1 Question)
- Introduction (10 Questions)
- Application
- Operating System (OS)-Based
- Web-Based
- Hardware Security Module
- Virtualization
- Cloud Specific
- Supply Chain
- Cryptographic
- Misconfiguration
- Mobile Device
- Zero-Day Vulnerabilities
- Exam Preparation Tasks (10 Questions)
- Labs (1 Question)
- Introduction (9 Questions)
- Malware Attacks
- Physical Attacks
- Network Attacks
- Application Attacks
- Cryptographic Attacks
- Password Attacks
- Indicators
- Exam Preparation Tasks (8 Questions)
- Labs (1 Question)
- Introduction (13 Questions)
- Segmentation
- Access Control
- Isolation
- Patching
- Encryption
- Monitoring
- Least Privilege
- Configuration Enforcement
- Decommissioning
- Hardening Techniques
- Exam Preparation Tasks (6 Questions)
- Labs (1 Question)
Part III: Security Architecture
- Introduction (9 Questions)
- Architecture and Infrastructure Concepts
- Considerations
- Exam Preparation Tasks (6 Questions)
- Introduction (9 Questions)
- Infrastructure Considerations
- Secure Communication/Access
- Selection of Effective Controls
- Exam Preparation Tasks (9 Questions)
- Labs
- Introduction (10 Questions)
- Data Types
- Data Classifications
- General Data Considerations
- Methods to Secure Data
- Exam Preparation Tasks (10 Questions)
- Introduction (10 Questions)
- High Availability
- Site Considerations
- Platform Diversity
- Multi-Cloud System
- Continuity of Operations
- Capacity Planning
- Testing
- Backups
- Power
- Exam Preparation Tasks (5 Questions)
Part IV: Security Operations
- Introduction (10 Questions)
- Secure Baselines
- Hardening Targets
- Wireless Devices
- Mobile Solutions
- Connection Methods
- Wireless Security Settings
- Application Security
- Sandboxing
- Monitoring
- Exam Preparation Tasks (8 Questions)
Lecture 15: Understanding the Security Implications of Hardware, Software, and Data Asset Management
- Introduction (6 Questions)
- Acquisition/Procurement Process
- Assignment/Accounting
- Monitoring/Asset Tracking
- Disposal/Decommissioning
- Exam Preparation Tasks (4 Questions)
- Introduction (10 Questions)
- Identification Methods
- Analysis
- Vulnerability Response and Remediation
- Validation of Remediation
- Reporting
- Exam Preparation Tasks (6 Questions)
- Labs (1 Question)
- Introduction (6 Questions)
- Monitoring and Computing Resources
- Activities
- Tools
- Exam Preparation Tasks (5 Questions)
- Introduction (12 Questions)
- Firewall
- IDS/IPS
- Web Filter
- Operating System Security
- Implementation of Secure Protocols
- DNS Filtering
- Email Security
- File Integrity Monitoring
- DLP
- Network Access Control (NAC)
- Endpoint Detection and Response (EDR)/Extended Detection and Response (XDR)
- User Behavior Analytics
- Exam Preparation Tasks (6 Questions)
- Labs
Part V: Security Program Management and Oversight
- Introduction (12 Questions)
- Provisioning/De-provisioning User Accounts
- Permission Assignments and Implications
- Identity Proofing
- Federation
- Single Sign-On (SSO)
- Interoperability
- Attestation
- Access Controls
- Multifactor Authentication (MFA)
- Password Concepts
- Privileged Access Management Tools
- Exam Preparation Tasks (6 Questions)
- Labs
- Introduction (10 Questions)
- Use Cases of Automation and Scripting
- Benefits
- Other Considerations
- Exam Preparation Tasks (6 Questions)
- Introduction (10 Questions)
- Process
- Training
- Testing
- Root Cause Analysis
- Threat Hunting
- Digital Forensics
- Exam Preparation Tasks (6 Questions)
- Labs
- Introduction (7 Questions)
- Log Data
- Data Sources
- Exam Preparation Tasks (6 Questions)
- Labs
Part VI: Final Preparation
- Introduction (8 Questions)
- Guidelines
- Policies
- Standards
- Procedures
- External Considerations
- Monitoring and Revision
- Types of Governance Structures
- Roles and Responsibilities for Systems and Data
- Exam Preparation Tasks (6 Questions)
- Introduction (10 Questions)
- Risk Identification
- Risk Assessment
- Risk Analysis
- Risk Register
- Risk Tolerance
- Risk Appetite
- Risk Management Strategies
- Risk Reporting
- Business Impact Analysis
- Exam Preparation Tasks (6 Questions
- Introduction (7 Questions)
- Vendor Assessment
- Agreement Types
- Vendor Monitoring
- Questionnaires
- Rules of Engagement
- Exam Preparation Tasks (6 Questions)
- Introduction (10 Questions)
- Compliance Reporting
- Consequences of Non-compliance
- Compliance Monitoring
- Attestation and Acknowledgment
- Privacy
- Exam Preparation Tasks (6 Questions)
- Introduction (7 Questions)
- Attestation
- Internal
- External
- Penetration Testing
- Exam Preparation Tasks (4 Questions)
- Introduction (6 Questions)
- Phishing
- Anomalous Behavior Recognition
- User Guidance and Training
- Reporting and Monitoring
- Development
- Execution
- Exam Preparation Tasks (4 Questions)