| 1.1 |
Given a scenario, analyze indicators of compromise and determine the type of malware. |
Lessons
|
| 1.2 |
Compare and contrast types of attacks. |
Lessons
|
| 1.3 |
Explain threat actor types and attributes. |
Lessons
|
| 1.4 |
Explain penetration testing concepts. |
Lessons
|
| 1.5 |
Explain vulnerability scanning concepts. |
Lessons
|
| 1.6 |
Explain the impact associated with types of vulnerabilities. |
Lessons
|
| 2.1 |
Install and configure network components, both hardwareand software-based, to support organizational security |
Lessons
|
| 2.2 |
Given a scenario, use appropriate software tools to assess the security posture of an organization. |
Lessons
|
| 2.3 |
Given a scenario, troubleshoot common security issues. |
Lessons
|
| 2.4 |
Given a scenario, analyze and interpret output from security technologies. |
Lessons
|
| 2.5 |
Given a scenario, deploy mobile devices securely. |
Lessons
|
| 2.6 |
Given a scenario, implement secure protocols. |
Lessons
|
| 3.1 |
Explain use cases and purpose for frameworks, best practices and secure configuration guides. |
Lessons
|
| 3.2 |
Given a scenario, implement secure network architecture concepts. |
Lessons
|
| 3.3 |
Given a scenario, implement secure systems design |
Lessons
|
| 3.4 |
Explain the importance of secure staging deployment concepts. |
Lessons
|
| 3.5 |
Explain the security implications of embedded systems. |
Lessons
|
| 3.6 |
Summarize secure application development and deployment concepts. |
Lessons
|
| 3.7 |
Summarize cloud and virtualization concepts |
Lessons
|
| 3.8 |
Explain how resiliency and automation strategies reduce risk. |
Lessons
|
| 3.9 |
Explain the importance of physical security controls. |
Lessons
|
| 4.1 |
Compare and contrast identity and access management concepts |
Lessons
|
| 4.2 |
Given a scenario, install and configure identity and access services. |
Lessons
|
| 4.3 |
Given a scenario, implement identity and access management controls. |
Lessons
|
| 4.4 |
Given a scenario, differentiate common account management practices. |
Lessons
|
| 5.1 |
Explain the importance of policies, plans and procedures related to organizational security |
Lessons
|
| 5.2 |
Summarize business impact analysis concepts. |
Lessons
|
| 5.3 |
Explain risk management processes and concepts. |
Lessons
|
| 5.4 |
Given a scenario, follow incident response procedures. |
Lessons
|
| 5.5 |
Summarize basic concepts of forensics. |
Lessons
|
| 5.6 |
Explain disaster recovery and continuity of operation concepts. |
Lessons
|
| 5.7 |
Compare and contrast various types of controls. |
Lessons
|
| 5.8 |
Given a scenario, carry out data security and privacy practices. |
Lessons
|
| 6.1 |
Compare and contrast basic concepts of cryptography |
Lessons
|
| 6.2 |
Explain cryptography algorithms and their basic characteristics. |
Lessons
|
| 6.3 |
Given a scenario, install and configure wireless security settings. |
Lessons
|
| 6.4 |
Given a scenario, implement public key infrastructure. |
Lessons
|