Module 1: General Security Concepts
Lesson 1: Compare and Contrast Various Types of Security Controls
Lesson 2: Summarize Fundamental Security Concepts
Lesson 3: Explain the Importance of Change Management Processes and the Impact to Security
Lesson 4: Explain the Importance of Using Appropriate Cryptographic Solutions
Module 1: Closer Look Labs
Module 2: Threats, Vulnerabilities and Mitigations
Lesson 5: Compare and Contrast Common Threat Actors and Motivations
Lesson 6: Explain Common Threat Vectors and Attack Surfaces
Lesson 7: Explain Various Types of Vulnerabilities
Lesson 8: Given a Scenario, Analyze Indicators of Malicious Activity
Lesson 9: Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise
Module 2: Closer Look Labs
Module 3: Security Architecture
Lesson 10: Compare and Contrast Security Implications of Different Architecture Models
Lesson 11: Given a Scenario, Apply Security Principles to Secure the Enterprise
Lesson 12: Compare and Contrast Concepts and Strategies to Protect Data
Lesson 13: Explain the Importance of Resilience and Recovery in Security Architecture
Module 3: Closer Look Labs
Module 4: Security Operations
Lesson 14: Given a Scenario, Apply Common Security Techniques to Computing Resources
Lesson 15: Explain the Security Implications of Proper Hardware, Software, and Data Asset Management
Lesson 16: Explain Various Activities Associated with Vulnerability Management
Lesson 17: Explain Security Alerting and Monitoring Concepts and Tools
Lesson 18: Given a Scenario, Modify Enterprise Capabilities to Enhance Security
Lesson 19: Given a Scenario, Implement and Maintain Identity and Access Management
Lesson 20: Explain the Importance of Automation and Orchestration Related to Secure Operations
Lesson 21: Explain Appropriate Incident Response Activities
Lesson 22: Given a Scenario, Use Data Sources to Support an Investigation
Module 4: Closer Look Labs
Module 5: Security Program Management and Oversight
Lesson 23: Summarize Effective Security Governance
Lesson 24: Explain Elements of the Risk Management Process
Lesson 25: Explain the Processes Associated with Third-Party Risk Assessment and Management
Lesson 26: Summarize Elements of Effective Security Compliance
Lesson 27: Explain Types and Purposes of Audits and Assessment
Lesson 28: Given a Scenario, Implement Security Awareness Practices
Module 5: Closer Look Labs