Course curriculum

    1. Description

    1. 1- Instructor Intro

    2. 2-About the Exam

    3. 3 - Test Taking Tips and Techniques

    4. 4-Explain the importance of threat data and intelligence

    5. 5 - Given a scenario, utilize threat intelligence to support organizational security

    6. 6-Given a scenario, perform vulnerability management activities Pt 1

    7. 7-Given a scenario, perform vulnerability management activities Pt 2

    8. 8-Given a scenario, analyze the output from common vulnerability assessment tools

    9. 9-Explain the threats and vulnerabilities associated with specialized technology

    10. 10-Explain the threats and vulnerabilities associated with operating in the Cloud

    11. 11-Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1

    12. 12-Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2

    1. 1 - Given a scenario, apply security solutions for infrastructure management Pt 1

    2. 2 - Given a scenario, apply security solutions for infrastructure management Pt 2

    3. 3 - Given a scenario, apply security solutions for infrastructure management Pt 3

    4. 4 - Explain software assurance best practices

    5. 5 - Explain hardware assurance best practices

    1. 1 - Given a scenario, analyze data as part of security monitoring activities Pt 1

    2. 2 - Given a scenario, analyze data as part of security monitoring activities Pt 2

    3. 3-Given a scenario, analyze data as part of security monitoring activities Pt 3

    4. 6-Explain the importance of proactive threat hunting

    5. 7-Compare and contrast automation concepts and technologies

    6. 4 - Given a scenario, implement configuration changes to existing controls to improve security Pt 1

    7. 5-Given a scenario, implement configuration changes to existing controls to improve security Pt 2

    1. 1 - Explain the importance of the incident response process

    2. 2 - Given a scenario, apply the appropriate the incident response procedure

    3. 3 - Given an incident, analyze potential indicators of compromise

    4. 4 - Given a scenario, utilize basic digital forensic techniques

    1. 1 - Understand the importance of data privacy and protection

    2. 2-Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1

    3. 3 - Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2

    4. 4-Explain the importance of frameworks, policies, procedures, and controls Pt 1

    5. 5-Explain the importance of frameworks, policies, procedures, and controls Pt 2

About this course

  • £229.00
  • 44 lessons
  • 14 hours of video content

Discover your potential, starting today