Course Features
- Lectures 60
- Quizzes 0
- Duration 25 Hour(s)
- Skill level All levels
- Language English
- Students 367
- Certificate Yes
- Assessments Yes
Curriculum
- 5 Sections
- 60 Lessons
- 90 Days
Expand all sectionsCollapse all sections
- 1.0 General Security Concepts9
- 1.1Compare and contrast various types of security controls27 Minutes
- 1.2Summarize fundamental security concepts – Part 132 Minutes
- 1.3Summarize fundamental security concepts – Part 211 Minutes
- 1.4Summarize fundamental security concepts – Part 326 Minutes
- 1.5Explain the importance of change management processes and the impact to security – Part 115 Minutes
- 1.6Explain the importance of change management processes and the impact to security – Part 218 Minutes
- 1.7Explain the importance of change management processes and the impact to security – Part 34 Minutes
- 1.8Explain the importance of using appropriate cryptographic solutions – Part 132 Minutes
- 1.9Explain the importance of using appropriate cryptographic solutions – Part 214 Minutes
- 2.0 Threats, Vulnerabilities, and Mitigations14
- 2.1Compare and contrast common threat actors and motivations -Part 132 Minutes
- 2.2Compare and contrast common threat actors and motivations -Part 231 Minutes
- 2.3Compare and contrast common threat actors and motivations -Part 315 Minutes
- 2.4Explain common threat vectors and attack surfaces -Part 131 Minutes
- 2.5Explain common threat vectors and attack surfaces -Part 227 Minutes
- 2.6Explain common threat vectors and attack surfaces -Part 317 Minutes
- 2.7Explain various types of vulnerabilities -Part 131 Minutes
- 2.8Explain various types of vulnerabilities -Part 230 Minutes
- 2.9Explain various types of vulnerabilities -Part 313 Minutes
- 2.10Given a scenario, analyze indicators of malicious activity – Part 132 Minutes
- 2.11Given a scenario, analyze indicators of malicious activity – Part 232 Minutes
- 2.12Given a scenario, analyze indicators of malicious activity – Part 310 Minutes
- 2.13Explain the purpose of mitigation techniques used to secure the enterprise – Part 130 Minutes
- 2.14Explain the purpose of mitigation techniques used to secure the enterprise – Part 218 Minutes
- 3.0 Security Architecture9
- 3.1Compare and contrast security implications of different architecture models -Part 131 Minutes
- 3.2Compare and contrast security implications of different architecture models -Part 230 Minutes
- 3.3Compare and contrast security implications of different architecture models -Part 36 Minutes
- 3.4Given a scenario, apply security principles to secure enterprise infrastructure -Part 130 Minutes
- 3.5Given a scenario, apply security principles to secure enterprise infrastructure -Part 230 Minutes
- 3.6Compare and contrast concepts and strategies to protect data – Part 131 Minutes
- 3.7Compare and contrast concepts and strategies to protect data – Part 217 Minutes
- 3.8Explain the importance of resilience and recovery in security architecture – Part 132 Minutes
- 3.9Explain the importance of resilience and recovery in security architecture – Part 26 Minutes
- 4.0 Security Operations19
- 4.1Given a scenario, apply common security techniques to computing resources -part 130 Minutes
- 4.2Given a scenario, apply common security techniques to computing resources -part 230 Minutes
- 4.3Given a scenario, apply common security techniques to computing resources -part 329 Minutes
- 4.4Explain the security implications of proper hardware, software, and data asset management -part 132 Minutes
- 4.5Explain the security implications of proper hardware, software, and data asset management -part 27 Minutes
- 4.6Explain various activities associated with vulnerability management -part 128 Minutes
- 4.7Explain various activities associated with vulnerability management -part 222 Minutes
- 4.8Explain security alerting and monitoring concepts and tools -part 130 Minutes
- 4.9Explain security alerting and monitoring concepts and tools -part 232 Minutes
- 4.10Given a scenario, modify enterprise capabilities to enhance security -part 128 Minutes
- 4.11Given a scenario, modify enterprise capabilities to enhance security -part 231 Minutes
- 4.12Given a scenario, modify enterprise capabilities to enhance security -part 327 Minutes
- 4.13Given a scenario, implement and maintain identity and access management -part 128 Minutes
- 4.14Given a scenario, implement and maintain identity and access management -part 223 Minutes
- 4.15Explain the importance of automation and orchestration related to secure operations -part 129 Minutes
- 4.16Explain the importance of automation and orchestration related to secure operations -part 233 Minutes
- 4.17Explain appropriate incident response activities -part 131 Minutes
- 4.18Explain appropriate incident response activities -part 216 Minutes
- 4.19Given a scenario, use data sources to support an investigation26 Minutes
- 5.0 Security Program Management and Oversight9
- 5.1Summarize elements of effective security governance -part 128 Minutes
- 5.2Summarize elements of effective security governance -part 226 Minutes
- 5.3Explain the processes associated with third-party risk assessment and management -Part 127 Minutes
- 5.4Explain the processes associated with third-party risk assessment and management -Part 210 Minutes
- 5.5Summarize elements of effective security compliance -Part 125 Minutes
- 5.6Summarize elements of effective security compliance -Part 223 Minutes
- 5.7Explain types and purposes of audits and assessments31 Minutes
- 5.8Given a scenario, implement security awareness practices37 Minutes
- 5.9Explain elements of the risk management process31 Minutes