Module 01 – SECURITY AND RISK MANAGEMENT
- Workbook (Pdf)
- Overview
- Confidentiality, Integrity, Availability (CIA)
- Confidentiality, Integrity, Availability (CIA) Pt2
- Evaluate, Apply Security Governance Principles
- Evaluate, Apply Security Goverance Principles Pt2
- Determine Compliance Requirements
- Determine Compliance Requirements Part 2
- Determine Compliance Requirements Part 3
- Understand Legal And Regulatory Issues
- Understand Legal And Regulatory Issues Part 2
- Understand, Adhere To And Promote Ethics
- Policy, Standards, Procedures And Guidelines
- Understand Business Continuity Requirements
- Understand Business Continuity Requirements Part 2
- Understand Business Continuity Requirements Part 3
- Personnel, Security Policies And Procedures
- Understand/Apply Risk Management Concepts
- Understand/Apply Risk Management Concepts Part 2
- Understand/Apply Risk Management Concepts Part 3
- Understand/Apply Risk Management Concepts Part 4
- Understand/Apply Risk Management Concepts Part 5
- Understanding/Apply Threat Modeling Concepts
- Apply Risk Management To The Supply Chain
- Security Awareness/Education And Training
- Security And Risk Management – Key Points
- CIA Deep Dive
- Organizational Roles And Responsibilities
- Risk Terminology And Concepts
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – SECURITY ARCHITECTURE AND ENGINEERING
- Workbook (Pdf)
- Implement And Manage Engineering Processes
- Fundamental Concepts Of Systems And Security
- Fundamental Concepts Of Systems And Security Pt.2
- Fundamental Concepts Of Systems And Security Pt.3
- Fundamental Concepts Of Systems And Security Pt.4
- Fundamental Concepts Of Systems And Security Pt.5
- Controls Based On Security Requirements
- Controls Based On Security Requirements Part 2
- Vulnerabilities Of Security Architecture
- Vulnerabilities Of Security Architecture Part 2
- Vulnerabilities Of Security Architecture Part 3
- Vulnerabilities Of Security Architectures Part 4
- Vulnerabilities In Web-Based Systems
- Vulnerabilities In Web-Based Systems Part 2
- Vulnerabilities In Mobile Systems
- Vulnerabilities In Embedded Devices
- Apply Cryptography
- Apply Cryptography Part 2
- Apply Cryptography Part 3
- Apply Cryptography Part 4
- Apply Cryptography Part 5
- Apply Cryptography Part 6
- Apply Cryptography Part 7
- Apply Cryptography Part 8
- Apply Cryptography Part 9
- Apply Cryptography Part 10
- Apply Cryptography Part 11
- Apply Cryptography Part 12
- Apply Cryptography Part 13
- Site/Facility Design And Security
- Site/Facility Design And Security Part 2
- Site/Facility Design And Security Part 3
- Site/Facility Design And Security Part 4
- Security Architecture And Engineering – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – IDENTITY AND ACCESS MANAGEMENT (IAM)
- Workbook (Pdf
- Control Physical And Logical Access To Assets
- Control Physical And Logical Access To Assets Pt 2
- Manage Identification And Authentication
- Manage Identification And Authentication Part 2
- Manage Identification And Authentication Part 3
- Integrate Identity As A Third-Party Service
- Implement/Manage Authorization Mechanisms
- Implement/Manage Authorization Mechanisms Pt.2
- Manage Identity And Access Provisioning Lifecycle
- Access Control Attacks
- Access Control Attacks Part 2
- Identity And Access Management – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 07 – SECURITY OPERATIONS
- Workbook (Pdf)
- Understand And Support Investigations
- Conduct Logging And Monitoring Activities
- Provisioning And Protecting Resources
- Provisioning And Protecting Resources Part 2
- Apply Foundational Security Operation Concepts
- Conduct Incident Management
- Detective And Preventative Measures
- Detective And Preventative Measures Part 2
- Patch And Vulnerability Management
- Understand Change Management
- Implement Recovery Strategies
- Implement Recovery Strategies Part 2
- Implement Recovery Strategies Part 3
- Implement Recovery Strategies Part 4
- Implement Recovery Strategies Part 5
- Implement And Test BCDR
- Implement And Test BCDR Part 2
- Implement And Test BCDR Part 3
- Implement And Manage Physical Security
- Implement And Manage Physical Security Part 2
- Personnel Safety And Security Concerns
- Security Operations – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – ASSET SECURITY
- Workbook (Pdf)
- Identify And Classify Information And Assets
- Determine And Maintain Information/Asset Ownership
- Protect Privacy
- Protect Privacy Part 2
- Ensure Appropriate Asset Retention
- Determine Data Security Controls
- Determine Data Security Controls Part 2
- Determine Data Security Controls Part 3
- Establish Asset Handling Requirements
- Asset Security – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – COMMUNICATION AND NETWORK SECURITY
- Workbook (Pdf)
- Secure Design Principles In Networks
- Secure Design Principles In Networks Part 2
- Secure Design Principles In Networks Part 3
- Secure Design Principles In Networks Part 4
- Secure Design Principles In Networks Part 5
- Secure Design Principles In Networks Part 6
- Secure Design Principles In Networks Part 7
- Secure Design Principles In Networks Part 8
- Secure Design Principles In Networks Part 9
- Secure Design Principles In Networks Part 10
- Secure Design Principles In Networks Part 11
- Secure Design Principles In Networks Part 12
- Secure Network Components
- Secure Network Components Part 2
- Secure Network Components Part 3
- Secure Network Components Part 4
- Secure Network Components Part 5
- Implement Secure Communication Channels
- Implement Secure Communication Channels Part 2
- Implement Secure Communication Channels Part 3
- Implement Secure Communication Channels Part 4
- Implement Secure Communication Channels Part 5
- Implement Secure Communication Channels Part 6
- Communication And Network Security – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 – SECURITY ASSESSMENT AND TESTING
- Workbook (Pdf)
- Assessment, Test And Audit
- Assessment, Test And Audit Part 2
- Conduct Security Control Testing
- Conduct Security Control Testing Part 2
- Conduct Security Control Testing Part 3
- Collect Security Process Data
- Security Assessment And Testing – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)
Module 08 – SOFTWARE DEVELOPMENT SECURITY
- Workbook (Pdf)
- Security In The SDLC
- Security In The SDLC Part 2
- Security In The SDLC Part 3
- Security In The SDLC Part 4
- Security In The SDLC Part 5
- Security In The SDLC Part 6
- Security Controls In Dev Environments
- Security Controls In Dev Environments Part 2
- Security Controls In Dev Environments Part 3
- Security Controls In Dev Environments Part 4
- Security Controls In Dev Environments Part 5
- Security Controls In Dev Environments Part 6
- Security Controls In Dev Environments Part 7
- Security Controls In Dev Environments Part 8
- Security Controls In Dev Environments Part 9
- Assess Effectiveness Of Software Security
- Assess Security Impact Of Acquired Software
- Secure Coding Guidelines And Standards
- Databases And Data Warehouses
- Databases And Data Warehouses Part 2
- Types Of Storage
- Knowledge-Based Systems
- Software Development Security – Key Points
- Review Quiz (Number of attempts allowed: Unlimited)