Curriculum
- 5 Sections
- 26 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- 1.0 Risk Management4
- 1.1Summarize business and industry influences and associated security risks.22 Minutes
- 1.2Compare and contrast security, privacy policies and procedures based on organizational requirements.36 Minutes
- 1.3Given a scenario, execute risk mitigation strategies and controls.10 Minutes
- 1.4Analyze risk metric scenarios to secure the enterprise.28 Minutes
- 2.0 Enterprise Security Architecture8
- 2.1Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-152 Minutes
- 2.2Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-264 Minutes
- 2.3Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements Part-322 Minutes
- 2.4Analyze a scenario to integrate security controls for host devices to meet security requirements Part-153 Minutes
- 2.5Analyze a scenario to integrate security controls for host devices to meet security requirements Part-229 Minutes
- 2.6Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements Part-161 Minutes
- 2.7Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements Part-214 Minutes
- 2.8Given software vulnerability scenarios, select appropriate security controls.66 Minutes
- 3.0 Enterprise Security Operations5
- 3.1Given a scenario, conduct a security assessment using the appropriate methods.51 Minutes
- 3.2Analyze a scenario or output, and select the appropriate tool for a security assessment Part-162 Minutes
- 3.3Analyze a scenario or output, and select the appropriate tool for a security assessment Part-258 Minutes
- 3.4Given a scenario, implement incident response and recovery procedures Part-159 Minutes
- 3.5Given a scenario, implement incident response and recovery procedures Part-215 Minutes
- 4.0 Technical Integration of Enterprise Security6
- 4.1Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture.45 Minutes
- 4.2Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture.46 Minutes
- 4.3Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives.36 Minutes
- 4.4Given a scenario, implement cryptographic techniques.53 Minutes
- 4.5Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 218 Minutes
- 4.6Given a scenario, select the appropriate control to secure communications and collaboration solutions – Part 110 Minutes
- 5.0 Research, Development and Collaboration3
- 5.1Given a scenario, apply research methods to determine industry trends and their impact to the enterprise.35 Minutes
- 5.2Given a scenario, implement security activities across the technology life cycle.58 Minutes
- 5.3Explain the importance of interaction across diverse business units to achieve security goals.19 Minutes
Compare and contrast security, privacy policies and procedures based on organizational requirements.
Next