The Present Threat Landscape
Types Of Malware
Social Engineering And Related Attacks
Application And Service Attacks
Cryptographic And Wireless Attacks
Penetration Testing And Vulnerability Scanning
Impacts From Vulnerability Types
Components Supporting Organizational Security
Security Assessment Using Software Tools
Cryptography
Public Key Infrastructure
Wireless Security Settings
Analyzing Output From Security Technologies
Deploying Mobile Devices Securely
Implementing Secure Protocols
Troubleshooting Common Security Issues
Identity Concepts And Access Services
Identity And Access Management Controls
Common Account Management Practices
Frameworks, Guidelines, And Physical Security
Implement Secure Network Architecture Concepts
Secure System And Application Design And Deployment
Cloud, Virtualisation, And Resiliency Concepts
Policies, Plans, And Procedures
Business Impact Analysis And Risk Management
Incident Response, Forensics, Disaster Recovery and Security Controls