About the Course
Part 1: Threats, Attacks, and Vulnerabilities
  Lesson 1: Comparing and Contrasting Different Types of Social Engineering Techniques
  Lesson 2: Analyzing Potential Indicators to Determine the Type of Attack
  Lesson 3: Analyzing Potential Indicators Associated with Application Attacks
  Lesson 4: Analyzing Potential Indicators Associated with Network Attacks
  Lesson 5: Understanding Different Threat Actors, Vectors and Intelligence Sources
  Lesson 6: Understanding the Security Concerns Associated with Various types of Vulnerabilities
  Lesson 7: Summarizing the Techniques Used in Security Assessments
  Lesson 8: Understanding the Techniques Used in Penetration Testing
Part 2: Architecture and Design
  Lesson 9: Understanding the Importance of Security Concepts in an Enterprise Environment
  Lesson 10: Summarizing Virtualization and Cloud Computing Concepts
  Lesson 11: Summarizing Secure Application Development, Deployment, and Automation Concepts
  Lesson 12: Summarizing Authentication and Authorization Design Concepts
  Lesson 13: Implementing Cybersecurity Resilience
  Lesson 14: Understanding the Security Implications of Embedded and Specialized Systems
  Lesson 15: Understanding the Importance of Physical Security Controls
  Lesson 16: Summarizing the Basics of Cryptographic Concepts
Part 3: Implementation
  Lesson 17: Implementing Secure Protocols
  Lesson 18: Implementing Host or Application Security Solutions
  Lesson 19: Implementing Secure Network Designs
  Lesson 20: Installing and Configuring Wireless Security Settings
  Lesson 21: Implementing Secure Mobile Solutions
  Lesson 22: Applying Cybersecurity Solutions to the Cloud
  Lesson 23: Implementing Identity and Account Management Controls
  Lesson 24: Implementing Authentications and Authorization Solutions
  Lesson 25: Implementing Public Key Infrastructure
Part 4: Operations and Incident Response
  Lesson 26: Using the Appropriate Tools to Assess Organizational Security
  Lesson 27: Summarizing the Importance of Policies, Processes, and Procedures for Incident Response
  Lesson 28: Using Appropriate Data Sources to Support an Investigation
  Lesson 29: Applying Mitigation Techniques or Controls to Secure an Environment
  Lesson 30: Understanding the Key Aspects of Digital Forensics
Part 5: Governance, Risk, and Compliance
  Lesson 31: Comparing and Contrasting the Various Types of Controls
  Lesson 32: Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture
  Lesson 33: Understanding the Importance of Policies to Organizational Security
  Lesson 34: Summarizing Risk Management Processes and Concepts
  Lesson 35: Understanding Privacy and Sensitive Data Concepts in Relation to Security