Part I: Threats, Attacks, and Vulnerabilities
– Social Engineering Techniques
– Attack Basics
– Application Attacks
– Network Attacks
– Threat Actors, Vectors, and Intelligence Sources
– Vulnerabilities
– Security Assessment Techniques
– Penetration Testing Techniques
Part II: Architecture and Design
– Enterprise Security Concepts
– Virtualization and Cloud Computing
– Secure Application Development, Deployment, and Automation
– Authentication and Authorization Design
– Cybersecurity Resilience
– Embedded and Specialized Systems
– Physical Security Controls
– Cryptographic Concepts
Part III: Implementation
– Secure Protocols
– Host and Application Security Solutions
– Secure Network Design
– Wireless Security Settings
– Secure Mobile Solutions
– Cloud Cybersecurity Solutions
– Identity and Account Management Controls
– Authentication and Authorization Solutions
– Public Key Infrastructure
Part IV: Operations and Incident Response
– Organizational Security
– Incident Response
– Incident Investigation
– Incident Mitigation
– Digital Forensics
Part V: Governance, Risk, and Compliance
– Control Types
– Regulations, Standards, and Frameworks
– Organizational Security Policies
– Risk Management
– Sensitive Data and Privacy
Ad hoc
Contatti