About Course
Course Objective
-
Identify and analyze threats, attacks, and vulnerabilities
-
Understand social engineering techniques and threat actors
-
Design secure enterprise architectures and apply security best practices
-
Implement secure network, host, and application configurations
-
Configure authentication, authorization, and identity management solutions
-
Implement Public Key Infrastructure (PKI) and cryptographic solutions
-
Apply cloud, mobile, and wireless security controls
-
Perform security assessments and understand penetration testing concepts
-
Respond to security incidents and apply mitigation techniques
-
Understand governance, risk management, compliance, and security policies
Course Outline
1. Threats, Attacks, and Vulnerabilities
- Compare and contrast different types of social engineering techniques
- Given a scenario, analyze potential indicators to determine the type of attack
- Given a scenario, analyze potential indicators associated with application attacks
- Given a scenario, analyze potential indicators associated with network attacks
- Explain different threat actors, vectors, and intelligence sources
- Explain the security concerns associated with various types of vulnerabilities
- Summarize the techniques used in security assessments
- Explain the techniques used in penetration testing
2. Architecture and Design
- Explain the importance of security concepts in an enterprise environment
- Summarize virtualization and cloud computing concepts
- Summarize secure application development, deployment, and automation concepts
- Summarize authentication and authorization design concepts
- Given a scenario, implement cybersecurity resilience
- Explain the security implications of embedded and specialized systems
- Explain the importance of physical security controls
- Summarize the basics of cryptographic concepts
3. Implementation
- Given a scenario, implement secure protocols
- Given a scenario, implement host or application security solutions
- Given a scenario, implement secure network designs
- Given a scenario, install and configure wireless security settings
- Given a scenario, implement secure mobile solutions
- Given a scenario, apply cybersecurity solutions to the cloud
- Given a scenario, implement identity and account management controls
- Given a scenario, implement authentication and authorization solutions
- Given a scenario, implement public key infrastructure
4. Operations and Incident Response
- Given a scenario, use the appropriate tool to assess organizational security
- Summarize the importance of policies, processes, and procedures for incident response
- Given an incident, utilize appropriate data sources to support an investigation
- Given an incident, apply mitigation techniques or controls to secure an environment
- Explain the key aspects of digital forensics.
5. Governance, Risk, and Compliance
- Compare and contrast various types of controls
- Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
- Explain the importance of policies to organizational security
- Summarize risk management processes and concepts
- Explain privacy and sensitive data concepts in relation to security
