Module 1: Security fundamentals
-
Security concepts
-
Enterprise security strategy
-
Security program components
Module 2: Risk management
-
Understanding threats
-
Risk management programs
-
Security assessments
Module 3: Cryptography
-
Cryptography concepts
-
Public key infrastructure
-
Module 4: Network connectivity
-
Network attacks
-
Packet flow
Module 5: Network security technologies
-
Network security components
-
Monitoring tools
Module 6: Secure network configuration
-
Secure network protocols
-
Hardening networks
Module 7: Authentication
-
Authentication factors
-
Authentication protocols
Module 8: Access control
-
Access control principles
-
Account management
Module 9: Securing hosts and data
-
Malware
-
Securing data
-
Securing hosts
Module 10: Securing specialized systems
-
Mobile security
-
Embedded and specialized systems
Module 11: Application security
-
Application attacks
-
Securing applications
Module 12: Cloud security
-
Virtual and cloud systems
-
Securing cloud services
Module 13: Organizational security
-
Social engineering
-
Security policies
-
User roles and training
-
Physical security and safety
Module 14: Disaster planning and recovery
-
Business continuity
-
Resilient systems
-
Incident response procedures