1 - COMPARING AND CONTRASTING ATTACKS
Compare and Contrast Information Security Roles
Explain Threat Actor Types
Compare and Contrast Social Engineering Attack Types
Determine Malware Types
2 - COMPARING AND CONTRASTING SECURITY CONTROLS
3 - ASSESSING SECURITY POSTURE WITH SOFTWARE TOOLS
Explain Penetration Testing Concepts
Assess Security Posture with Topology Discovery Software Tools
Assess Security Posture with Fingerprinting and Sniffing Software Tools
Assess Security Posture with Vulnerability Scanning Software Tools
4 - EXPLAINING BASIC CRYPTOGRAPHY CONCEPTS
Compare and Contrast Basic Concepts of Cryptography
Explain Hashing and Symmetric Cryptographic Algorithms
Explain Asymmetric Cryptographic Algorithms
5 - IMPLEMENTING A PUBLIC KEY INFRASTRUCTURE
6 - IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT CONTROLS
Compare and Contrast Identity and Authentication Concepts
Install and Configure Authentication Protocols
Implement Multifactor Authentication
7 - MANAGING ACCESS SERVICES AND ACCOUNTS
Install and Configure Authorization and Directory Services
Implement Access Management Controls
Differentiate Account Management Practices
Implement Account Auditing and Recertification
8 - IMPLEMENTING A SECURE NETWORK ARCHITECTURE
Implement Secure Network Architecture Concepts
Install and Configure a Secure Switching Infrastructure
Install and Configure Network Access Control
Install and Configure a Secure Routing and NAT Infrastructure
9 - INSTALLING AND CONFIGURING SECURITY APPLIANCES
Install and Configure Firewalls and Proxies
Install and Configure Load Balancers
Install and Configure Intrusion Detection/Prevention Systems
Install and Configure Data Loss Prevention (DLP) Systems
Install and Configure Logging and SIEM Systems
10 - INSTALLING AND CONFIGURING WIRELESS AND PHYSICAL ACCESS SECURITY
Install and Configure a Wireless Infrastructure
Install and Configure Wireless Security Settings
Explain the Importance of Physical Security Controls
11 - DEPLOYING SECURE HOST, MOBILE, AND EMBEDDED SYSTEMS
Implement Secure Hardware Systems Design
Implement Secure Host Systems Design
Implement Secure Mobile Device Systems Design
Implement Secure Embedded Systems Design
12 - IMPLEMENTING SECURE NETWORK ACCESS PROTOCOLS
Implement Secure Network Operations Protocols
Implement Secure Remote Access Protocols
Implement Secure Remote Administration Protocols
13 - IMPLEMENTING SECURE NETWORK APPLICATIONS
Implement Secure Web Services
Implement Secure Communications Services
Summarize Secure Virtualization Infrastructure
Summarize Secure Cloud Services
14 - EXPLAINING RISK MANAGEMENT AND DISASTER RECOVERY CONCEPTS
Explain Risk Management Processes and Concepts
Explain Resiliency and Automation Strategies
Explain Disaster Recovery and Continuity of Operation Concepts
Summarize Basic Concepts of Forensics
15 - SUMMARIZING SECURE APPLICATION DEVELOPMENT CONCEPTS
16 - EXPLAINING ORGANIZATIONAL SECURITY CONCEPTS
Explain the Importance of Security Policies
Implement Data Security and Privacy Practices
Explain the Importance of Personnel Management