Module 1: General Security Concepts
1.1 General Security Concepts
1.2 Security Control Categories and Types
Quiz 1
1.3 Physical Security
1.4 Change Movement
Quiz 2
Lab 1.1: Security Concept Fundamentals
Module 2: Cryptographic Solutions and Threats
2.1 Cryptography Concepts
2.2 Implementations of Cryptography
2.3 Cryptographic Tools
Lab 2.1: Cryptographic Solutions
Quiz 3
2.4 Public Key Infrastructure
2.5 Threats
Lab 2.2: Threat Vectors and Attack Surfaces
2.6 Social Engineering
Quiz 4
Module 3: Vulnerabilities, Indicators of Malicious Activity, and Mitigation
3.1 Types of Vulnerabilities
Lab 3.1: Identifying Security Vulnerabilities
Quiz 5
3.2 Indicators of Malicious Activity
Lab 3.2: Analyze Malicious Activity
3.3 Mitigation Techniques to Secure the Enterprise
Quiz 6
Module 4: Secure Network and Cloud Infrastructures, and Data Protection
4.1 Security Implications of Different Architecture Models
Lab 4.1: Security Architecture Models
Quiz 7
4.2 Secure Enterprise Infrastructure
Lab 4.2: Securing Enterprise Infrastructure
4.3 Concepts and Strategies to Protect Data
Lab 4.3: Data Protection Strategies
Quiz 8
Midterm Exam
Module 5: Resilience and Recovery, Secure Computing Resources, and Asset Management
5.1 Importance of Resilience and Recovery in Security Architecture
Lab 5.1: Resilience in Security Architecture
Quiz 9
5.2 Common Security Techniques for Computing Resources
Lab 5.2: Securing Computing Resources
Quiz 10
5.3 Secure Asset Management
Lab 5.3: Asset Management Techniques
Quiz 11
Module 6: Vulnerability Management, Alerting and Monitoring, and Enhancing Enterprise Security
6.1 Activities Associated with Vulnerability Management
Lab 6.1: Vulnerability Management
Quiz 12
6.2 Security Alerting and Monitoring
Lab 6.2: Monitoring Computer Resources
Quiz 13
6.3 Modify Enterprise Capabilities to Enhance Security
Lab 6.3: Enhancing Enterprise Security
Quiz 14
Module 7: Identify and Access Management, Automation and Orchestration Incident Response, and Log Data
7.1 Implement and Maintain Identity and Access Management (IAM)
Lab 7.1: Implement Identity and Access Management
7.2 Automation and Orchestration to Secure Operations
Quiz 15
Lab 7.2: Implementation of Automation and Orchestration for Security Operations
7.3 Incident Response
Lab 7.3: Investigate Data Sources
7.4 Log Data
Quiz 16
Module 8: Governance and Risk Management
8.1 Security Governance
Quiz 17
8.2 Risk Management Process
Quiz 18
8.3 Third-Party Risk Assessment and Management
Lab 8.1: Mitigation Techniques
Quiz 19
Module 9: Compliance, Audits and Assessments, and Security Awareness
9.1 Security Compliance
Quiz 20
9.2 Audits and Assessments
Quiz 21
9.3 Security Awareness
Quiz 22
Final Exam