Module 01 – THREATS, ATTACKS AND VULNERABILITIES
- Workbook (Pdf)
- Overview
- Determining Types Of Malware
- Determining Types Of Malware Part 2
- Types Of Attacks
- Types Of Attacks Part 2
- Types Of Attacks Part 3
- Types Of Attacks Part 4
- Threat Vector Types And Attributes
- Penetration Testing Concepts
- Vulnerability Scanning Concepts
- Impact Of Various Vulnerabilities
- Impact Of Various Vulnerabilities Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – ARCHITECTURE AND DESIGN
- Workbook (Pdf)
- Best Practices And Secure Config Guides
- Secure Network Architecture Concepts
- Secure System Design
- Secure Staging Deployment Concepts
- Security Implications Of Embedded Systems
- Secure App Development And Deployment
- Cloud And Virtualization Concepts
- Cloud And Virtalization Concepts Part 2
- Resiliency And Automation To Reduce Risk
- Importance Of Physical Security
- Importance Of Physical Security Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – RISK MANAGEMENT
- Workbook (Pdf)
- Policies, Plans And Procedures
- Business Impact Analysis
- Risk Management Processes And Concepts
- Incident Response Procedures
- Basic Concepts Of Forensics
- Disaster Recovery And Business Continuity
- Disaster Recovery And Business Continuity Part 2
- Data Security And Privacy
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – TECHNOLOGIES AND TOOLS
- Workbook (Pdf)
- Hardware Software Organizational Security
- Hardware Software Organizational Security Part 2
- Hardware Software Organizational Security Part 3
- Hardware Software Organizational Security Part 4
- Security Posture Assessment
- Security Posture Assessment Part 2
- Security Posture Assessment Part 3
- Security Posture Assessment Part 4
- Troubleshoot Common Security Issues
- Troubleshoot Common Security Issues Part 2
- Analyze And Interpret Outputs
- Analyze And Interpret Outputs Part 2
- Deploy Mobile Security
- Implement Secure Protocols
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – IDENTITY AND ACCESS MANAGEMENT
- Workbook (Pdf)
- Identity And Access Management Concepts
- Identity And Access Services
- Identity And Access Management Controls
- Identity And Access Management Controls Part 2
- Account Management Practices
- Account Management Practices Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 – CRYPTOGRAPHY AND PKI
- Workbook (Pdf)
- Basic Concepts Of Cryptography
- Basic Concepts Of Cryptography Part 2
- Cryptography Algorithms Basics
- Cryptography Algorithms Basics Part 2
- Cryptography Algorithms Basics Part 3
- Wireless Security
- Public Key Infrastructure
- Public Key Infrastructure Part 2
- Public Key Infrastructure Part 3
- Public Key Infrastructure Part 4
- Review Quiz (Number of attempts allowed: Unlimited)