Module 1: Security fundamentals
- Security concepts
- Enterprise security strategy
- Security program components
Module 2: Risk management
- Understanding threats
- Risk management programs
- Security assessments
Module 3: Cryptography
- Cryptography concepts
- Public key infrastructure
- Module 4: Network connectivity
- Network attacks
- Packet flow
Module 5: Network security technologies
- Network security components
- Monitoring tools
Module 6: Secure network configuration
- Secure network protocols
- Hardening networks
Module 7: Authentication
- Authentication factors
- Authentication protocols
Module 8: Access control
- Access control principles
- Account management
Module 9: Securing hosts and data
- Malware
- Securing data
- Securing hosts
Module 10: Securing specialized systems
- Mobile security
- Embedded and specialized systems
Module 11: Application security
- Application attacks
- Securing applications
Module 12: Cloud security
- Virtual and cloud systems
- Securing cloud services
Module 13: Organizational security
- Social engineering
- Security policies
- User roles and training
- Physical security and safety
Module 14: Disaster planning and recovery
- Business continuity
- Resilient systems
- Incident response procedures