Curriculum
- 5 Sections
- 35 Lessons
- 30 Days
Expand all sectionsCollapse all sections
- Threats, Attacks, and Vulnerabilities8
- 1.0Compare and contrast different types of social engineering techniques.
- 1.1Given a scenario, analyze potential indicators to determine the type of attack.
- 1.2Given a scenario, analyze potential indicators associated with application attacks.
- 1.3Given a scenario, analyze potential indicators associated with network attacks.
- 1.4Explain different threat actors, vectors, and intelligence sources.
- 1.5Explain the security concerns associated with various types of vulnerabilities.
- 1.6Summarize the techniques used in security assessments.
- 1.7Explain the techniques used in penetration testing.
- Architecture and Design8
- 2.0Explain the importance of security concepts in an enterprise environment.
- 2.1Summarize virtualization and cloud computing concepts.
- 2.2Summarize secure application development, deployment, and automation concepts.
- 2.3Summarize authentication and authorization design concepts.
- 2.4Given a scenario, implement cybersecurity resilience.
- 2.5Explain the security implications of embedded and specialized systems.
- 2.6Explain the importance of physical security controls.
- 2.7Summarize the basics of cryptographic concepts.
- Implementation9
- 3.0Given a scenario, implement secure protocols.
- 3.1Given a scenario, implement host or application security solutions.
- 3.2Given a scenario, implement secure network designs.
- 3.3Given a scenario, install and configure wireless security settings.
- 3.4Given a scenario, implement secure mobile solutions.
- 3.5Given a scenario, apply cybersecurity solutions to the cloud.
- 3.6Given a scenario, implement identity and account management controls.
- 3.7Given a scenario, implement authentication and authorization solutions.
- 3.8Given a scenario, implement public key infrastructure.
- Operations and Incident Response5
- 4.0Given a scenario, use the appropriate tool to assess organizational security.
- 4.1Summarize the importance of policies, processes, and procedures for incident response.
- 4.2Given an incident, utilize appropriate data sources to support an investigation.
- 4.3Given an incident, apply mitigation techniques or controls to secure an environment.
- 4.4Explain the key aspects of digital forensics.
- Governance, Risk, and Compliance5
- 5.0Compare and contrast various types of controls.
- 5.1Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.
- 5.2Explain the importance of policies to organizational security.
- 5.3Summarize risk management processes and concepts.
- 5.4Explain privacy and sensitive data concepts in relation to security.
Given a scenario, analyze potential indicators to determine the type of attack.
Next

