1 – Security Fundamentals
- Information Security Cycle & Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
2 – Identifying Security Threats and Vulnerabilities
- Social Engineering
- Malware
- Physical Threats and Vulnerabilities
- Software-Based Threats
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
3 – Managing Data, Application, and Host Security
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
4 – Implementing Network Security
- Configure Security Parameters on Network Devices and Technologies
- Network Design Elements and Components
- Implement Networking Protocols and Services
- Apply Secure Network Administration Principles
- Secure Wireless Traffic
5 – Implementing Access Control, Authentication, and Account Management
- Access Control and Authentication Services
- Implement Account Management Security Controls
6 – Managing Certificates
- Install a Certificate Authority (CA) Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Revoke Certificates
- Back Up and Restore Certificates and Private Keys
- Restore Certificates and Private Keys
7 – Implementing Compliance and Operational Security
- Physical Security
- Legal Compliance
- Security Awareness and Training
- Integrate Systems and Data with Third Parties
8 – Risk Management
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
9 – Troubleshooting and Managing Security Incidents
- Respond to Security Incidents
- Recover from a Security Incident
10 – Business Continuity and Disaster Recovery Planning
- Business Continuity
- Plan for Disaster Recovery
- Execute Disaster Recovery Plans and Procedures