Chapter 1 - Introduction to Security Concepts
◾ Identifying Threat Actors and Vectors
◾ Understanding Vulnerabilities
◾ Understanding Attack Types
◾ Identifying Social Engineering Techniques
Chapter 2 - Analyzing Attacks
◾ Security Assessment Tools and Techniques
◾ Application Attacks
◾ Network Attacks
◾ Penetration Testing
Chapter 3 - Architecture and Design
◾ Enterprise Security Architecture
◾ Designing Authentication and Authorization
◾ Designing Resiliency
◾ Cloud and Virtualization Concepts
◾ Securing Application Development and Deployment
Chapter 4 - Physical and System Security
◾ Physical Security Controls
◾ Securing Embedded and Specialized Systems
Chapter 5 – Cryptography
◾ Cryptographic Concepts
◾ Public Key Infrastructures
Chapter 6 - Implementing Secure Networks
◾ Implement Secure Protocols
◾ Implement Secure Network Designs
◾ Implementing Security in the Cloud
◾ Implement Wireless Security
◾ Implement Secure Mobile Solutions
Chapter 7 - Implementing Secure Hosts and Identities
◾ Implement Authentication and Authorization Systems
◾ Implement Identity and Account Management Controls
◾ Implement Host and Application Security Solutions
Chapter 8 - Operational Procedures
◾ Using Tools to Assess Security
◾ Utilizing Data Sources for Investigation
◾ Applying Mitigation Techniques
Chapter 9 - Incident Response and Forensics
◾ Incident Response Policies and Procedures
◾ Understanding Digital Forensics
Chapter 10 - Governance, Risk, and Compliance
◾ Introduction to Control Types
◾ Understanding Governance
◾ Implementing Security Policies
◾ Implementing Risk Management
◾ Compliance with Privacy and Sensitive Data