Lesson 00 - Course Overview
Lesson 1.1 - Implementing Security Configuration Parameters
Lesson 1.2 - Use Secure Network Administration Principles
Lesson 1.3 - Network Design Elements and Components
Lesson 1.4 - Implementing Common Protocols and Services
Lesson 1.5 - Troubleshoot security issues
Lesson 2.1 - Introduction to importance of risk
Lesson 2.2 - Summarize the Security Implications
Lesson 2.3 - Implementing Appropriate Risk Mitigation Strategies
Lesson 2.4 - Implement basics of forensic procedure
Lesson 2.5 - Summarizing incident response procedures
Lesson 2.6 - Importance of Security Related Awareness and Training
Lesson 2.7 - Compare and Contrast Physical Security and Environmental Controls
Lesson 2.8 - Summarizing Risk Management Best Practices
Lesson 2.9 - Select the Appropriate Control
Lesson 3.1 - Explain types of Malware
Lesson 3.2 - Summarize Various Types of Attacks
Lesson 3.3 - Summarize Social Engineering Attacks
Lesson 3.4 - Explain types of Wireless Attacks
Lesson 3.5 - Explain types of Application Attacks
Lesson 3.6 - Appropriate Type of Mitigation
Lesson 3.7 - Tools and Techniques to Discover Security Threats and Vulnerabilities
Lesson 3.8 - Explaining the Proper Use of Penetration Testing vs Vulnerability Scanning
Lesson 4.1 - Importance of Application Security Controls and Techniques
Lesson 4.2 - Summarizing Mobile Security Concepts and Technologies
Lesson 4.3 - Select the Appropriate Solution
Lesson 4.4 - Alternative Methods to Mitigate Security Risks
Lesson 4.5 - Alternative Methods to Mitigate Security Risks in Static Environments
Lesson 5.1 - Comparing and Contrasting the Function
Lesson 5.2 - Selecting the AAA in a Scenario
Lesson 5.3 - Installing and Configuring Security Controls
Lesson 6.1 - Utilizing Cryptography
Lesson 6.2 - Using Appropriate Cryptographic Methods
Lesson 6.3 - Use appropriate PKI CM and AC
Performance Based Questions