1.0 Threats, Attacks and Vulnerabilities |
|
1.1 Compare and contrast different types of social engineering techniques |
Chapter 4 |
1.2 Given a scenario, analyze potential indicators to determine the type of attack |
Chapters 3, 4, 7 |
1.3 Given a scenario, analyze potential indicators associated with application attacks |
Chapters 6, 12 |
1.4 Given a scenario, analyze potential indicators associated with network attacks |
Chapters 3, 12, 13 |
1.5 Explain different threat actors, vectors, and intelligence sources |
Chapter 2 |
1.6 Explain the security concerns associated with various types of vulnerabilities |
Chapters 1, 2, 5 |
1.7 Summarize the techniques used in security assessments |
Chapters 5, 14 |
1.8 Explain the techniques used in penetration testing |
Chapter 5 |
2.0 Architecture and Design |
|
2.1 Explain the importance of security concepts in an enterprise environment |
Chapters 1, 6, 7, 9, 10, 11, 12 |
2.2 Summarize virtualization and cloud computing concepts |
Chapter 10 |
2.3 Summarize secure application development, deployment, and automation concepts |
Chapter 6 |
2.4 Summarize authentication and authorization design concepts |
Chapter 8 |
2.5 Given a scenario, implement cybersecurity resilience |
Chapter 9 |
2.6 Explain the security implications of embedded and specialized systems |
Chapter 11 |
2.7 Explain the importance of physical security controls |
Chapters 9, 15 |
2.8 Summarize the basics of cryptographic concepts |
Chapters 7, 11 |
3.0 Implementation |
|
3.1 Given a scenario, implement secure protocols |
Chapter 12 |
3.2 Given a scenario, implement host or application security solutions |
Chapters 6, 11 |
3.3 Given a scenario, implement secure network designs |
Chapter 12 |
3.4 Given a scenario, install and configure wireless security settings |
Chapter 13 |
3.5 Given a scenario, implement secure mobile solutions |
Chapter 13 |
3.6 Given a scenario, apply cybersecurity solutions to the cloud |
Chapter 10 |
3.7 Given a scenario, implement identity and account management controls |
Chapter 8 |
3.8 Given a scenario, implement authentication and authorization solutions |
Chapter 8 |
3.9 Given a scenario, implement public key infrastructure |
Chapter 7 |
4.0 Operations and Incident Response |
|
4.1 Given a scenario use the appropriate tool to assess organizational security |
Chapters 4, 5, 11, 12, 15 |
4.2 Summarize the importance of policies, processes, and procedures for incident response |
Chapter 14 |
4.3 Given an incident, utilize appropriate data sources to support an investigation |
Chapter 14 |
4.4 Given an incident, apply mitigation techniques or controls to secure an environment |
Chapter 14 |
4.5 Explain the key aspects of digital forensics |
Chapter 15 |
5.0 Governance, Risk, and Compliance |
|
5.1 Compare and contrast various types of controls |
Chapter 1 |
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture |
Chapters 10, 16 |
5.3 Explain the importance of policies to organizational security |
Chapter 16 |
5.4 Summarize risk management processes and concepts |
Chapter 17 |
5.5 Explain privacy and sensitive data concepts in relation to security |
Chapter 17 |