Objective | Chapter |
1.0 THREAT AND VULNERABILITY MANAGEMENT |
1.1 Explain the importance of threat data and intelligence. | Chapter 1 |
1.2 Given a scenario, utilize threat intelligence to support organizational security. | Chapter 1 |
1.3 Given a scenario, perform vulnerability management activities. | Chapter 1 |
1.4 Given a scenario, analyze the output from common vulnerability assessment tools. | Chapter 1 |
1.5 Explain the threats and vulnerabilities associated with specialized technology. | Chapter 1 |
1.6 Explain the threats and vulnerabilities associated with operating in the cloud. | Chapter 1 |
1.7 Given a scenario, implement controls to mitigate attacks and software vulnerabilities. | Chapter 1 |
2.0 SOFTWARE AND SYSTEMS SECURITY | |
2.1 Given a scenario, apply security solutions for infrastructure management. | Chapter 2 |
2.2 Explain software assurance best practices. | Chapter 2 |
2.3 Explain hardware assurance best practices. | Chapter 2 |
3.0 SECURITY OPERATIONS AND MONITORING | |
3.1 Given a scenario, analyze data as part of security monitoring activities. | Chapter 3 |
3.2 Given a scenario, implement configuration changes to existing controls to improve security. | Chapter 3 |
3.3 Explain the importance of proactive threat hunting. | Chapter 3 |
3.4 Compare and contrast automation concepts and technologies. | Chapter 3 |
4.0 INCIDENT RESPONSE | |
4.1 Explain the importance of the incident response process. | Chapter 4 |
4.2 Given a scenario, apply the appropriate incident response procedure. | Chapter 4 |
4.3 Given an incident, analyze potential indicators of compromise. | Chapter 4 |
4.4 Given a scenario, utilize basic digital forensic techniques. | Chapter 4 |
5.0 COMPLIANCE AND ASSESSMENT | |
5.1 Understand the importance of data privacy and protection. | Chapter 5 |
5.2 Given a scenario, apply security concepts in support of organizational risk mitigation. | Chapter 5 |
5.3 Explain the importance of frameworks, policies, procedures, and controls. | Chapter 5 |