Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1.1
Given a scenario, analyze indicators of compromise and determine the type of malware. |
|
1.2
Compare and contrast types of attacks. |
|
1.3
Explain threat actor types and attributes. |
|
1.4
Explain penetration testing concepts. |
|
1.5
Explain vulnerability scanning concepts. |
|
1.6
Explain the impact associated with types of vulnerabilities. |
|
2.1
Install and configure network components, both hardwareand software-based, to support organizational security |
|
2.2
Given a scenario, use appropriate software tools to assess the security posture of an organization. |
|
2.3
Given a scenario, troubleshoot common security issues. |
|
2.4
Given a scenario, analyze and interpret output from security technologies. |
|
2.5
Given a scenario, deploy mobile devices securely. |
|
2.6
Given a scenario, implement secure protocols. |
|
3.1
Explain use cases and purpose for frameworks, best practices and secure configuration guides. |
|
3.2
Given a scenario, implement secure network architecture concepts. |
|
3.3
Given a scenario, implement secure systems design |
|
3.4
Explain the importance of secure staging deployment concepts. |
|
3.5
Explain the security implications of embedded systems. |
|
3.6
Summarize secure application development and deployment concepts. |
|
3.7
Summarize cloud and virtualization concepts |
|
3.8
Explain how resiliency and automation strategies reduce risk. |
|
3.9
Explain the importance of physical security controls. |
|
4.1
Compare and contrast identity and access management concepts |
|
4.2
Given a scenario, install and configure identity and access services. |
|
4.3
Given a scenario, implement identity and access management controls. |
|
4.4
Given a scenario, differentiate common account management practices. |
|
5.1
Explain the importance of policies, plans and procedures related to organizational security |
|
5.2
Summarize business impact analysis concepts. |
|
5.3
Explain risk management processes and concepts. |
|
5.4
Given a scenario, follow incident response procedures. |
|
5.5
Summarize basic concepts of forensics. |
|
5.6
Explain disaster recovery and continuity of operation concepts. |
|
5.7
Compare and contrast various types of controls. |
|
5.8
Given a scenario, carry out data security and privacy practices. |
|
6.1
Compare and contrast basic concepts of cryptography |
|
6.2
Explain cryptography algorithms and their basic characteristics. |
|
6.3
Given a scenario, install and configure wireless security settings. |
|
6.4
Given a scenario, implement public key infrastructure. |
|