What you’ll learn
- Comparing Security Roles and Security Controls
- Explaining Threat Actors and Threat Intelligence
- Performing Security Assessments
- Identifying Social Engineering and Malware
- Summarizing Basic Cryptographic Concepts
- Implementing Public Key Infrastructure
- Implementing Authentication Controls
- Implementing Identity and Account Management Controls
- Implementing Secure Network Designs
- Implementing Network Security Appliances
- Implementing Secure Network Protocols
- Implementing Host Security Solutions
- Implementing Secure Mobile Solutions
- Summarizing Secure Application Concepts
- Implementing Secure Cloud Solutions
- Explaining Data Privacy and Protection Concepts
- Performing Incident Response
- Explaining Digital Forensics
- Summarizing Risk Management Concepts
- Implementing Cybersecurity Resilience
- Explaining Physical Security
- Analyzing Security Monitoring Data
- Collecting and Querying Security Monitoring Data
- Utilizing Digital Forensics and Indicator Analysis Techniques
- Applying Incident Response Procedures
- Applying Risk Mitigation and Security Frameworks
- Performing Vulnerability Management
The curriculum is empty
0.0
0 total
5
4
3
2
1