Module 01 – SECURITY AND RISK MANAGEMENT

  1. Workbook (Pdf)
  2. Overview
  3. Confidentiality, Integrity, Availability (CIA)
  4. Confidentiality, Integrity, Availability (CIA) Pt2
  5. Evaluate, Apply Security Governance Principles
  6. Evaluate, Apply Security Goverance Principles Pt2
  7. Determine Compliance Requirements
  8. Determine Compliance Requirements Part 2
  9. Determine Compliance Requirements Part 3
  10. Understand Legal And Regulatory Issues
  11. Understand Legal And Regulatory Issues Part 2
  12. Understand, Adhere To And Promote Ethics
  13. Policy, Standards, Procedures And Guidelines
  14. Understand Business Continuity Requirements
  15. Understand Business Continuity Requirements Part 2
  16. Understand Business Continuity Requirements Part 3
  17. Personnel, Security Policies And Procedures
  18. Understand/Apply Risk Management Concepts
  19. Understand/Apply Risk Management Concepts Part 2
  20. Understand/Apply Risk Management Concepts Part 3
  21. Understand/Apply Risk Management Concepts Part 4
  22. Understand/Apply Risk Management Concepts Part 5
  23. Understanding/Apply Threat Modeling Concepts
  24. Apply Risk Management To The Supply Chain
  25. Security Awareness/Education And Training
  26. Security And Risk Management – Key Points
  27. CIA Deep Dive
  28. Organizational Roles And Responsibilities
  29. Risk Terminology And Concepts
  30. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – SECURITY ARCHITECTURE AND ENGINEERING

  1. Workbook (Pdf)
  2. Implement And Manage Engineering Processes
  3. Fundamental Concepts Of Systems And Security
  4. Fundamental Concepts Of Systems And Security Pt.2
  5. Fundamental Concepts Of Systems And Security Pt.3
  6. Fundamental Concepts Of Systems And Security Pt.4
  7. Fundamental Concepts Of Systems And Security Pt.5
  8. Controls Based On Security Requirements
  9. Controls Based On Security Requirements Part 2
  10. Vulnerabilities Of Security Architecture
  11. Vulnerabilities Of Security Architecture Part 2
  12. Vulnerabilities Of Security Architecture Part 3
  13. Vulnerabilities Of Security Architectures Part 4
  14. Vulnerabilities In Web-Based Systems
  15. Vulnerabilities In Web-Based Systems Part 2
  16. Vulnerabilities In Mobile Systems
  17. Vulnerabilities In Embedded Devices
  18. Apply Cryptography
  19. Apply Cryptography Part 2
  20. Apply Cryptography Part 3
  21. Apply Cryptography Part 4
  22. Apply Cryptography Part 5
  23. Apply Cryptography Part 6
  24. Apply Cryptography Part 7
  25. Apply Cryptography Part 8
  26. Apply Cryptography Part 9
  27. Apply Cryptography Part 10
  28. Apply Cryptography Part 11
  29. Apply Cryptography Part 12
  30. Apply Cryptography Part 13
  31. Site/Facility Design And Security
  32. Site/Facility Design And Security Part 2
  33. Site/Facility Design And Security Part 3
  34. Site/Facility Design And Security Part 4
  35. Security Architecture And Engineering – Key Points
  36. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – IDENTITY AND ACCESS MANAGEMENT (IAM)

  1. Workbook (Pdf
  2. Control Physical And Logical Access To Assets
  3. Control Physical And Logical Access To Assets Pt 2
  4. Manage Identification And Authentication
  5. Manage Identification And Authentication Part 2
  6. Manage Identification And Authentication Part 3
  7. Integrate Identity As A Third-Party Service
  8. Implement/Manage Authorization Mechanisms
  9. Implement/Manage Authorization Mechanisms Pt.2
  10. Manage Identity And Access Provisioning Lifecycle
  11. Access Control Attacks
  12. Access Control Attacks Part 2
  13. Identity And Access Management – Key Points
  14. Review Quiz (Number of attempts allowed: Unlimited)

Module 07 – SECURITY OPERATIONS

  1. Workbook (Pdf)
  2. Understand And Support Investigations
  3. Conduct Logging And Monitoring Activities
  4. Provisioning And Protecting Resources
  5. Provisioning And Protecting Resources Part 2
  6. Apply Foundational Security Operation Concepts
  7. Conduct Incident Management
  8. Detective And Preventative Measures
  9. Detective And Preventative Measures Part 2
  10. Patch And Vulnerability Management
  11. Understand Change Management
  12. Implement Recovery Strategies
  13. Implement Recovery Strategies Part 2
  14. Implement Recovery Strategies Part 3
  15. Implement Recovery Strategies Part 4
  16. Implement Recovery Strategies Part 5
  17. Implement And Test BCDR
  18. Implement And Test BCDR Part 2
  19. Implement And Test BCDR Part 3
  20. Implement And Manage Physical Security
  21. Implement And Manage Physical Security Part 2
  22. Personnel Safety And Security Concerns
  23. Security Operations – Key Points
  24. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – ASSET SECURITY

  1. Workbook (Pdf)
  2. Identify And Classify Information And Assets
  3. Determine And Maintain Information/Asset Ownership
  4. Protect Privacy
  5. Protect Privacy Part 2
  6. Ensure Appropriate Asset Retention
  7. Determine Data Security Controls
  8. Determine Data Security Controls Part 2
  9. Determine Data Security Controls Part 3
  10. Establish Asset Handling Requirements
  11. Asset Security – Key Points
  12. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – COMMUNICATION AND NETWORK SECURITY

  1. Workbook (Pdf)
  2. Secure Design Principles In Networks
  3. Secure Design Principles In Networks Part 2
  4. Secure Design Principles In Networks Part 3
  5. Secure Design Principles In Networks Part 4
  6. Secure Design Principles In Networks Part 5
  7. Secure Design Principles In Networks Part 6
  8. Secure Design Principles In Networks Part 7
  9. Secure Design Principles In Networks Part 8
  10. Secure Design Principles In Networks Part 9
  11. Secure Design Principles In Networks Part 10
  12. Secure Design Principles In Networks Part 11
  13. Secure Design Principles In Networks Part 12
  14. Secure Network Components
  15. Secure Network Components Part 2
  16. Secure Network Components Part 3
  17. Secure Network Components Part 4
  18. Secure Network Components Part 5
  19. Implement Secure Communication Channels
  20. Implement Secure Communication Channels Part 2
  21. Implement Secure Communication Channels Part 3
  22. Implement Secure Communication Channels Part 4
  23. Implement Secure Communication Channels Part 5
  24. Implement Secure Communication Channels Part 6
  25. Communication And Network Security – Key Points
  26. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 – SECURITY ASSESSMENT AND TESTING

  1. Workbook (Pdf)
  2. Assessment, Test And Audit
  3. Assessment, Test And Audit Part 2
  4. Conduct Security Control Testing
  5. Conduct Security Control Testing Part 2
  6. Conduct Security Control Testing Part 3
  7. Collect Security Process Data
  8. Security Assessment And Testing – Key Points
  9. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 – SOFTWARE DEVELOPMENT SECURITY

  1. Workbook (Pdf)
  2. Security In The SDLC
  3. Security In The SDLC Part 2
  4. Security In The SDLC Part 3
  5. Security In The SDLC Part 4
  6. Security In The SDLC Part 5
  7. Security In The SDLC Part 6
  8. Security Controls In Dev Environments
  9. Security Controls In Dev Environments Part 2
  10. Security Controls In Dev Environments Part 3
  11. Security Controls In Dev Environments Part 4
  12. Security Controls In Dev Environments Part 5
  13. Security Controls In Dev Environments Part 6
  14. Security Controls In Dev Environments Part 7
  15. Security Controls In Dev Environments Part 8
  16. Security Controls In Dev Environments Part 9
  17. Assess Effectiveness Of Software Security
  18. Assess Security Impact Of Acquired Software
  19. Secure Coding Guidelines And Standards
  20. Databases And Data Warehouses
  21. Databases And Data Warehouses Part 2
  22. Types Of Storage
  23. Knowledge-Based Systems
  24. Software Development Security – Key Points
  25. Review Quiz (Number of attempts allowed: Unlimited)