About the Course
Part 1: Threats, Attacks, and Vulnerabilities
Lesson 1: Comparing and Contrasting Different Types of Social Engineering Techniques
Lesson 2: Analyzing Potential Indicators to Determine the Type of Attack
Lesson 3: Analyzing Potential Indicators Associated with Application Attacks
Lesson 4: Analyzing Potential Indicators Associated with Network Attacks
Lesson 5: Understanding Different Threat Actors, Vectors and Intelligence Sources
Lesson 6: Understanding the Security Concerns Associated with Various types of Vulnerabilities
Lesson 7: Summarizing the Techniques Used in Security Assessments
Lesson 8: Understanding the Techniques Used in Penetration Testing
Part 2: Architecture and Design
Lesson 9: Understanding the Importance of Security Concepts in an Enterprise Environment
Lesson 10: Summarizing Virtualization and Cloud Computing Concepts
Lesson 11: Summarizing Secure Application Development, Deployment, and Automation Concepts
Lesson 12: Summarizing Authentication and Authorization Design Concepts
Lesson 13: Implementing Cybersecurity Resilience
Lesson 14: Understanding the Security Implications of Embedded and Specialized Systems
Lesson 15: Understanding the Importance of Physical Security Controls
Lesson 16: Summarizing the Basics of Cryptographic Concepts
Part 3: Implementation
Lesson 17: Implementing Secure Protocols
Lesson 18: Implementing Host or Application Security Solutions
Lesson 19: Implementing Secure Network Designs
Lesson 20: Installing and Configuring Wireless Security Settings
Lesson 21: Implementing Secure Mobile Solutions
Lesson 22: Applying Cybersecurity Solutions to the Cloud
Lesson 23: Implementing Identity and Account Management Controls
Lesson 24: Implementing Authentications and Authorization Solutions
Lesson 25: Implementing Public Key Infrastructure
Part 4: Operations and Incident Response
Lesson 26: Using the Appropriate Tools to Assess Organizational Security
Lesson 27: Summarizing the Importance of Policies, Processes, and Procedures for Incident Response
Lesson 28: Using Appropriate Data Sources to Support an Investigation
Lesson 29: Applying Mitigation Techniques or Controls to Secure an Environment
Lesson 30: Understanding the Key Aspects of Digital Forensics
Part 5: Governance, Risk, and Compliance
Lesson 31: Comparing and Contrasting the Various Types of Controls
Lesson 32: Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture
Lesson 33: Understanding the Importance of Policies to Organizational Security
Lesson 34: Summarizing Risk Management Processes and Concepts
Lesson 35: Understanding Privacy and Sensitive Data Concepts in Relation to Security