Curriculum
- 5 Sections
- 41 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- 1.0 Threats, Attacks, and Vulnerabilities7
- 1.1Compare and contrast different types of social engineering techniques11 Minutes
- 1.2Given a scenario, analyze potential indicators to determine the type of attack and application attacks.52 Minutes
- 1.3Given a scenario, analyze potential indicators to determine the type of attack.83 Minutes
- 1.4Explain different threat actors, vectors, and intelligence sources.42 Minutes
- 1.5Explain the security concerns associated with various types of vulnerabilities.33 Minutes
- 1.6Summarize the techniques used in security assessments.29 Minutes
- 1.7Explain the techniques used in penetration testing.60 Minutes
- 2.0 Architecture and Design8
- 2.1Explain the importance of security concepts in an enterprise environment.60 Minutes
- 2.2Summarize virtualization and cloud computing concepts75 Minutes
- 2.3Summarize secure application development, deployment, and automation concepts.61 Minutes
- 2.4Summarize authentication and authorization design concepts34 Minutes
- 2.5Given a scenario, implement cybersecurity resilience.54 Minutes
- 2.6Explain the security implications of embedded and specialized systems45 Minutes
- 2.7Explain the importance of physical security controls.46 Minutes
- 2.8Summarize the basics of cryptographic concepts49 Minutes
- 3.0 Implementation11
- 3.1Given a scenario, implement secure protocols52 Minutes
- 3.2Given a scenario, implement host or application security solutions53 Minutes
- 3.3Given a scenario, implement secure network designs Part-158 Minutes
- 3.4Given a scenario, install and configure wireless security settings.53 Minutes
- 3.5Given a scenario, implement secure mobile solutions Part-138 Minutes
- 3.6Given a scenario, implement secure mobile solutions Part-220 Minutes
- 3.7Given a scenario, apply cybersecurity solutions to the cloud.37 Minutes
- 3.8Given a scenario, implement identity and account management controls.23 Minutes
- 3.9Given a scenario, implement authentication and authorization solutions.53 Minutes
- 3.10Given a scenario, implement secure network designs Part-221 Minutes
- 3.11Given a scenario, implement public key infrastructure.35 Minutes
- 4.0 Operations and Incident Response10
- 4.1Given a scenario, use the appropriate tool to assess organizational security Part-115 Minutes
- 4.2Given a scenario, use the appropriate tool to assess organizational security Part-247 Minutes
- 4.3Given a scenario, use the appropriate tool to assess organizational security Part-350 Minutes
- 4.4Given a scenario, use the appropriate tool to assess organizational security Part-413 Minutes
- 4.5Summarize the importance of policies, processes, and procedures for incident response Part-121 Minutes
- 4.6Summarize the importance of policies, processes, and procedures for incident response Part-226 Minutes
- 4.7Given an incident, utilize appropriate data sources to support an investigation Part-150 Minutes
- 4.8Given an incident, utilize appropriate data sources to support an investigation Part-25 Minutes
- 4.9Given an incident, apply mitigation techniques or controls to secure an environment.20 Minutes
- 4.10Explain the key aspects of digital forensics.43 Minutes
- 5.0 Governance, Risk, and Compliance5
- 5.1Compare and contrast various types of controls.13 Minutes
- 5.2Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.36 Minutes
- 5.3Explain the importance of policies to organizational security.22 Minutes
- 5.4Summarize risk management processes and concepts37 Minutes
- 5.5Explain privacy and sensitive data concepts in relation to security.38 Minutes