About the Course
Part I: Security Architecture
Lesson 1: Ensuring a Secure Network Architecture
Lesson 2: Determining the Proper Infrastructure Design
Lesson 3: Securely Integrating Software Applications
Lesson 4: Securing the Enterprise Architecture by Implementing Data Security Techniques
Lesson 5: Providing the Appropriate Authentication and Authorization Controls
Lesson 6: Implementing Secure Cloud and Virtualization Solutions
Lesson 7: Supporting Security Objectives and Requirements with Cryptography and Public Key Infrastructure (PKI)
Lesson 8: Managing the Impact of Emerging Technologies on Enterprise Security and Privacy
Part II: Security Operations
Lesson 9: Performing Threat Management Activities
Lesson 10: Analyzing Indicators of Compromise and Formulating an Appropriate Response
Lesson 11: Performing Vulnerability Management Activities
Lesson 12: Using the Appropriate Vulnerability Assessment and Penetration Testing Methods and Tools
Lesson 13: Analyzing Vulnerabilities and Recommending Risk Mitigations
Lesson 14: Using Processes to Reduce Risk
Lesson 15: Implementing the Appropriate Incident Response
Lesson 16: Forensic Concepts
Lesson 17: Forensic Analysis Tools
Part III: Security Engineering and Cryptography
Lesson 18: Applying Secure Configurations to Enterprise Mobility
Lesson 19: Configuring and Implementing Endpoint Security Controls
Lesson 20: Security Considerations Impacting Specific Sectors and Operational Technologies
Lesson 21: Cloud Technology’s Impact on Organizational Security
Lesson 22: Implementing the Appropriate PKI Solution
Lesson 23: Implementing the Appropriate Cryptographic Protocols and Algorithms
Lesson 24: Troubleshooting Issues with Cryptographic Implementations
Part IV: Governance, Risk and Compliance
Lesson 25: Applying Appropriate Risk Strategies
Lesson 26: Managing and Mitigating Vendor Risk
Lesson 27: The Organization Impact of Compliance Frameworks and Legal Considerations
Lesson 28: Business Community and Disaster Recovery Concepts