Course Details
Course Outline
1 - Perform Risk Management Activities
Topic 1A Explain Risk Assessment Methods Exam objectives covered 4.1 Given a set of requirements, apply the appropriate risk strategiesTopic 1B Summarize the Risk Lifecycle Exam objectives covered 4.1 Given a set of requirements, apply the appropriate risk strategiesTopic 1C Assess & Mitigate Vendor Risk Exam objectives covered 4.2 Explain the importance of managing and mitigating vendor risk.
2 - Summarizing Governance & Compliance Strategies
Topic 2A Meet Cloud Identifying Critical Data Assets Exam objectives covered 4.3 Explain compliance frameworks and legal considerations, and their organizational impact.Topic 2B Design Compare and Contrast Regulation, Accreditation, and Standards Exam objectives covered 4.3 Explain compliance frameworks and legal considerations, and their organizational impact.Topic 2C Explain Legal Considerations & Contract Types Exam objectives covered 4.3 Explain compliance frameworks and legal considerations, and their organizational impact.
3 - Implementing Business Continuity & Disaster Recovery
Topic 3A Explain the Role of Business Impact Analysis Exam objectives covered: 4.4 Explain the importance of business continuity and disaster recovery concepts.Topic 3B Assess Disaster Recovery Plans Exam objectives covered 4.4 Explain the importance of business continuity and disaster recovery concepts.Topic 3C Explain Testing and Readiness Activities Exam objectives covered 4.4 Explain the importance of business continuity and disaster recovery concepts.
4 - Identifying Infrastructure Services
Topic 4A Explain Critical Network Services Exam objectives covered 1.1 Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.Topic 4B Explain Defensible Network Design Exam objectives covered 1.1 Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.Topic 4C Implement Durable Infrastructures Exam objectives covered 1.2 Given a scenario, analyze the organizational requirements to determine the proper infrastructure security design.
5 - Performing Software Integration
Topic 5A Explain Secure Integration Activities Exam objectives covered 1.3 Given a scenario, integrate software applications securely into an enterprise architecture.Topic 5B Assess Software Development Activities Exam objectives covered 1.3 Given a scenario, integrate software applications securely into an enterprise architectureTopic 5C Analyze Access Control Models & Best Practices Exam objectives covered 1.5 Given a scenario, analyze the security requirements and objectives to provide the appropriate authentication and authorization controls.Topic 5D Analyze Development Models & Best Practices Exam objectives covered 1.4 Given a scenario, implement data security techniques for securing enterprise architecture.
6 - Explain Virtualization, Cloud, and Emerging Technology
Topic 6A Explain Virtualization and Cloud Technology Exam objectives covered 1.6 Given a set of requirements, implement secure cloud and virtualization solutionsTopic 6B Explain Emerging Technologies Exam objectives covered 1.8 Explain the impact of emerging technologies on enterprise security and privacy.
7 - Exploring Secure Configurations and System Hardening
Topic 7A Analyze Enterprise Mobility Protections Exam objectives covered 3.1 Given a scenario, apply secure configurations to enterprise mobilityTopic 7B Implement Endpoint Protection Exam objectives covered 3.2 Given a scenario, configure and implement endpoint security controls.
8 - Understanding Security Considerations of Cloud and Specialized Platforms
Topic 8A Understand Impacts of Cloud Technology Adoption Exam objectives covered 3.4 Explain how cloud technology adoption impacts organizational security.Topic 8B Explain Security Concerns for Sector-Specific Technologies Exam objectives covered 3.3 Explain security considerations impacting specific sectors and operational technologies.
9 - Implementing Cryptography
Topic 9A Implementing Hashing and Symmetric Algorithms Exam objectives covered 3.6 Given a business requirement, implement the appropriate cryptographic protocols and algorithms.Topic 9B Implementing Appropriate Asymmetric Algorithms and Protocols Exam objectives covered 3.6 Given a business requirement, implement the appropriate cryptographic protocols and algorithms.
10 - Implementing Public Key Infrastructure (PKI)
Topic 10A Analyze Objectives of Cryptography and Public Key Infrastructure (PKI) Exam objectives covered 1.7 Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements.Topic 10B Implementing Appropriate PKI Solutions Exam objectives covered 3.5 Given a business requirement, implement the appropriate PKI solution. 3.7 Given a scenario, troubleshoot issues with cryptographic implementations.
11 - Understanding Threat and Vulnerability Management Activities
Topic 11A Explore Threat and Vulnerability Management Concepts Exam objectives covered2.1 Given a scenario, perform threat management activities. 2.3 Given a scenario, perform vulnerability management activities.Topic 11B Explain Vulnerability and Penetration Test Methods Exam objectives covered 2.4 Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.Topic 11C Explain Technologies Designed to Reduce Risk Exam objectives covered 2.6 Given a scenario, use processes to reduce risk
12 - Developing Incident Response Capabilities
Topic 12A Analyzing and Mitigating VulnerabilitiesExam objectives covered 2.5 Given a scenario, analyze vulnerabilities and recommend risk mitigations.Topic 12B Identifying and Responding to Indicators of Compromise Exam objectives covered 2.2 Given a scenario, analyze indicators of compromise and formulate an appropriate response. 2.7 Given an incident, implement the appropriate response.Topic 12C Exploring Digital Forensic Concepts Exam objectives covered 2.8 Explain the importance of forensic concepts. 2.9 Given a scenario, use forensic analysis tools.
Actual course outline may vary depending on offering center. Contact your sales representative for more information.