1.1 |
Given a scenario, analyze indicators of compromise and determine the type of malware. |
Lessons
|
1.2 |
Compare and contrast types of attacks. |
Lessons
|
1.3 |
Explain threat actor types and attributes. |
Lessons
|
1.4 |
Explain penetration testing concepts. |
Lessons
|
1.5 |
Explain vulnerability scanning concepts. |
Lessons
|
1.6 |
Explain the impact associated with types of vulnerabilities. |
Lessons
|
2.1 |
Install and configure network components, both hardwareand software-based, to support organizational security |
Lessons
|
2.2 |
Given a scenario, use appropriate software tools to assess the security posture of an organization. |
Lessons
|
2.3 |
Given a scenario, troubleshoot common security issues. |
Lessons
|
2.4 |
Given a scenario, analyze and interpret output from security technologies. |
Lessons
|
2.5 |
Given a scenario, deploy mobile devices securely. |
Lessons
|
2.6 |
Given a scenario, implement secure protocols. |
Lessons
|
3.1 |
Explain use cases and purpose for frameworks, best practices and secure configuration guides. |
Lessons
|
3.2 |
Given a scenario, implement secure network architecture concepts. |
Lessons
|
3.3 |
Given a scenario, implement secure systems design |
Lessons
|
3.4 |
Explain the importance of secure staging deployment concepts. |
Lessons
|
3.5 |
Explain the security implications of embedded systems. |
Lessons
|
3.6 |
Summarize secure application development and deployment concepts. |
Lessons
|
3.7 |
Summarize cloud and virtualization concepts |
Lessons
|
3.8 |
Explain how resiliency and automation strategies reduce risk. |
Lessons
|
3.9 |
Explain the importance of physical security controls. |
Lessons
|
4.1 |
Compare and contrast identity and access management concepts |
Lessons
|
4.2 |
Given a scenario, install and configure identity and access services. |
Lessons
|
4.3 |
Given a scenario, implement identity and access management controls. |
Lessons
|
4.4 |
Given a scenario, differentiate common account management practices. |
Lessons
|
5.1 |
Explain the importance of policies, plans and procedures related to organizational security |
Lessons
|
5.2 |
Summarize business impact analysis concepts. |
Lessons
|
5.3 |
Explain risk management processes and concepts. |
Lessons
|
5.4 |
Given a scenario, follow incident response procedures. |
Lessons
|
5.5 |
Summarize basic concepts of forensics. |
Lessons
|
5.6 |
Explain disaster recovery and continuity of operation concepts. |
Lessons
|
5.7 |
Compare and contrast various types of controls. |
Lessons
|
5.8 |
Given a scenario, carry out data security and privacy practices. |
Lessons
|
6.1 |
Compare and contrast basic concepts of cryptography |
Lessons
|
6.2 |
Explain cryptography algorithms and their basic characteristics. |
Lessons
|
6.3 |
Given a scenario, install and configure wireless security settings. |
Lessons
|
6.4 |
Given a scenario, implement public key infrastructure. |
Lessons
|