● Module 1: Information Security Roles Security Control and Framework Types ● 1.1 Introduction and Overview ● 1.2 Compare and Contrast Information Security Roles ● 1.3 Compare and Contrast Security Control and Framework Types ● 1.4 Module Summary
● Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources ● 2.1 Explain Threat Actor Types and Attack Vectors ● 2.2 Explain Threat Intelligence Sources ● 2.3 Module Summary
● Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing ● 3.1 Assess Organizational Security with Network Reconnaissance Tools ● 3.2 Packet Capture and Replay Demo ● 3.3 Explain Security Concerns with General Vulnerability Types ● 3.4 Summarize Vulnerability Scanning Techniques ● 3.5 Explain Penetration Testing Concepts ● 3.6 Module Summary
● Module 4: Social Engineering, Indicators of Malware Attacks ● 4.1 Compare and Contrast Social Engineering Techniques ● 4.2 Analyze Indicators of Malware-based Attacks ● 4.3 Fork Bomb Malware Demo ● 4.4 Module Summary
● Module 5: Cryptography ● 5.1 Compare and Contrast Cryptographic Ciphers ● 5.2 Summarize Cryptographic Modes of Operation ● 5.3 Summarize Cryptographic Use Cases and Weaknesses ● 5.4 Summarize Other Cryptographic Technologies ● 5.5 Module Summary
● Module 6: Certificates and PKI ● 6.1 Implement Certificates and Certificate Authorities ● 6.2 Implement PKI Management ● 6.3 Implementing a PKI Demo ● 6.4 Module Summary
● Module 7: Authentication ● 7.1 Summarize Authentication Design Concepts ● 7.2 Implement Knowledge-based Authentication ● 7.3 Password Cracker Demo ● 7.4 Implement Authentication Technologies ● 7.5 Summarize Biometrics Authentication Concepts ● 7.6 Module Summary
● Module 8: Identity and Accounts, Authorization, Personnel Polices ● 8.1 Implement Identity and Account Types ● 8.2 Implement Account Policies ● 8.3 Account Types and Polices Demo ● 8.4 Implement Authorization Solutions ● 8.5 Explain the Importance of Personnel Policies ● 8.6 Module Summary
● Module 9: Network Design and Hardware (Part 1) ● 9.1 Implement Secure Network Designs ● 9.2 Implement Secure Switching and Routing ● 9.3 Various Types of Network Attacks Demo ● 9.4 Implement Secure Wireless Infrastructure