Fundamentals of Security
- Threats & Vulnerabilities
- CIA Triad
- IAAA of Security
- Security Controls
- Gap Analysis
- Zero-Trust Model
Threat Actors
Physical Security
Social Engineering
Malware
Data Protection
- Data Classification
- Data Ownership
- Data States & Types
- Data Protection Techniques
- Data Loss Prevention (DLP)
Cryptographic Solutions
- Encryption
- Hashing
- Digital Certificate
- Blockchain
- Encryption Tools & Techniques
- Obfuscation
- Cryptographic Attacks
Risk Management
- Risk Assessment Frequency
- Risk Identification
- Risk Analysis
- Risk Management Strategies
- Risk Monitoring
Third-Party Vendor Risk
Governance and Compliance
Asset & Change Management
Audits & Assessments
Cyber Resilience & Redundancy
Security Architecture
- Benefits of Cloud Computing
- Cloud Security Concerns
- Virtualization
- Software Defined Networking (SDN)
- Internet of Things (IoT)
- ICS and SCADA Systems
- Embedded Systems
Security Infrastructure
- Network Ports
- Firewalls
- IDS and IPS
- Load Balancer
- Proxy Server
- VPN Server
- SD-WAN and SASE
- Network Security Zones
Identity and Access Management (IAM) Solutions
- Identity and Access Management (IAM)
- Authentication Factors
- Single Sign-On (SSO)
- Access Control Models
Vulnerabilities and Attacks
Malicious Activity
Hardening
Security Techniques
- Wireless Encryption Standards
- Application Security
- Network Access Control (NAC)
- Web and DNS Filtering
- Email Security
- Endpoint Protection