Module 01 – THREAT AND VULNERABILITY MANAGEMENT
- Workbook (Pdf)
- Overview
- Intelligence Sources
- Indicator Management
- Confidence Levels
- Threat Classification
- Threat Actors
- Threat Actors
- Intelligence Cycle
- Commodity Malware
- Information Sharing And Analysis Centers
- Attack Frameworks
- Threat Research
- Threat Modeling Methodologies
- Threat Intelligence Sharing, Supported Functions
- Vulnerability Identification And Validation
- Vulnerability Remediation And Mitigation
- Vulnerability Scanning Parameters And Criteria
- Inhibitors To Remediation
- Web App Scanners
- Infrastructure Vulnerability Scanners
- Software Assessment Tools And Techniques
- Vulnerability Enumeration
- Wireless Assessment Tools
- Cloud Infrastructure Assessment Tools
- Mobile Technology Threats
- Premises And Vehicle Systems Threats
- Controller System Threats
- IoT And Embedded System Threats
- CVSS Metrics
- Cloud Deployment Model Threats
- Cloud Service Model Threats
- Other Cloud Service Threats
- Mitigate Specific Attack Types
- Mitigate Vulnerability Types
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – SECURITY OPERATIONS AND MONITORING
- Workbook (Pdf)
- Trend Analysis
- URL Analysis
- DNS Analysis
- Packet And Protocol Analysis
- Flow Analysis
- Endpoint Behavior Analysis
- Malware Analysis
- Log Review
- Impact Analysis
- SIEM Review
- Email Analysis
- File System Permissions
- Blacklisting And Whitelisting
- Firewall Configurations
- Data Loss Prevention
- Network Access Control
- Blackholes And Sinkholes
- Malware Signatures
- Threat Hunting
- Scripting
- AI And Machine Learning
- Continuous Integration And Deployment
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – COMPLIANCE AND ASSESSMENT
- Workbook (Pdf)
- Privacy Vs. Security
- Non-Technical Controls – The Basics
- Non-Technical Controls – The Rest
- Technical Controls – The Basics
- Technical Controls – The Rest
- What Is Risk
- How Do We Calculate Risk
- How Do We Analyze Risk
- How Do We Prioritize, Communicate Risk
- How Do We Document And Train For Risk
- Apply Risk Management To Our Supply Chains
- Controls
- Policies And Procedures
- Frameworks, Audits And Policy
- IAM Policies And Procedures
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – SOFTWARE AND SYSTEMS SECURITY
- Workbook (Pdf)
- Asset Tagging And Change Management
- Network Architecture And Segmentation
- Identity And Access Management
- Virtual Desktop Infrastructure, Containerization
- Honeypots And Active Defense
- Cloud Access Security Broker
- Certificate Management
- Hardware Assurance
- Software Assurance And Secure Coding
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – INCIDENT RESPONSE
- Workbook (Pdf)
- Incident Response Communication
- Incident Response Phases
- Indicators Of Compromise
- Digital Forensics
- Review Quiz (Number of attempts allowed: Unlimited)