Module 1: Supporting IT Governance and Risk Management
- Identify the Importance of IT Governance and Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
Module 2: Leveraging Collaboration to Support Security
- Facilitate Collaboration across Business Units
- Secure Communications and Collaboration Solutions
Module 3: Using Research and Analysis to Secure the Enterprise
- Determine Industry Trends and Their Effects on the Enterprise
- Analyze Scenarios to Secure the Enterprise
Module 4: Integrating Advanced Authentication and Authorization Techniques
- Implement Authentication and Authorization Technologies
- Implement Advanced Identity and Access Management
Module 5: Implementing Cryptographic Techniques
- Select Cryptographic Techniques
- Implement Cryptography
Module 6: Implementing Security Controls for Hosts
- Select Host Hardware and Software
- Harden Hosts
- Virtualize Servers and Desktops
- Protect Boot Loaders
Module 7: Implementing Security Controls for Mobile Devices
- Implement Mobile Device Management
- Address Security and Privacy Concerns for Mobile Devices
Module 8: Implementing Network Security
- Plan Deployment of Network Security Components and Devices
- Plan Deployment of Network-Enabled Devices
- Implement Advanced Network Design
- Implement Network Security Controls
Module 9: Implementing Security in the Systems and Software Development Lifecycle
- Implement Security throughout the Technology Lifecycle
- Identify General Application Vulnerabilities
- Identify Web Application Vulnerabilities
- Implement Application Security Controls
Module 10: Integrating Assets in a Secure Enterprise Architecture
- Integrate Standards and Best Practices in Enterprise Security
- Select Technical Deployment Models
- Integrate Cloud-Augmented Security Services
- Secure the Design of the Enterprise Infrastructure
- Integrate Data Security in the Enterprise Architecture
- Integrate Enterprise Applications in a Secure Architecture
Module 11: Conducting Security Assessments
- Select Security Assessment Methods
- Perform Security Assessments with Appropriate Tools
Module 12: Responding to and Recovering from Incidents
- Prepare for Incident Response and Forensic Investigations
- Conduct Incident Response and Forensic Analysis