Chapter 1: Day 1 – Security and Risk Management - Security, Compliance, and Policies
Overview of security, compliance, and policies
Confidentiality, Integrity, and Availability (CIA)
Legal and regulatory issues
Security policies, standards, procedures, and guidelines
Personnel security policies
Chapter 2: Day 2 – Security and Risk Management - Risk Management, Business Continuity, and Security Education
Overview of risk management, business continuity, and security education
Security risk considerations in acquisitions, strategy, and practice
Information security education, training, and awareness
Chapter 3: Day 3 – Asset Security - Information and Asset Classification
Overview of asset security - information and asset classification
Asset classification and control
Chapter 4: Day 4 – Asset Security - Data Security Controls and Handling
Overview of asset security - data security controls and handling
Data Loss Prevention (DLP)
Data Loss Prevention strategies
Cryptographic methods to secure data
Data handling requirements
Chapter 5: Day 5 – Exam Cram and Practice Questions
An overview of exam cram and practice questions
References and further reading
Chapter 6: Day 6 – Security Engineering - Security Design, Practices, Models, and Vulnerability Mitigation
An overview of security design, practices, models, and vulnerability mitigation
Certification and accreditation
Information security models
Vulnerability assessment and mitigation
Chapter 7: Day 7 – Security Engineering - Cryptography
An overview of cryptography
The fundamentals of cryptography
Applications and the use of cryptography
Public Key Infrastructure (PKI)
Key management techniques
Chapter 8: Day 8 – Communication and Network Security - Network Security
An overview of communication and network security
Network architecture, protocols, and technologies
Open System Interconnect (OSI) model
Chapter 9: Day 9 – Communication and Network Security - Communication Security
An overview of communication security
Security in communication channels
Attacks on communication networks
Preventing or mitigating communication network attacks
Chapter 10: Day 10 – Exam Cram and Practice Questions
An overview of exam cram and practice questions
References and further reading
Chapter 11: Day 11 – Identity and Access Management - Identity Management
An overview of identity and access management
Physical and logical access to assets
Identity management principles and implementation
Third-party identity services
Chapter 12: Day 12 – Identity and Access Management - Access Management, Provisioning, and Attacks
An overview of access management
Access management concepts, methodologies, and techniques
Identity and provisioning life cycle
Access control attacks and countermeasures
Chapter 13: Day 13 – Security Assessment and Testing - Designing, Performing Security Assessment, and Tests
An overview of security assessment and testing
Security assessment and test strategies
Chapter 14: Day 14 – Security Assessment and Testing - Controlling, Analyzing, Auditing, and Reporting
An overview of controlling, analyzing, auditing, and reporting security test data
A collection of security process data
Analyzing security process data
Internal and third-party security audits
Reporting test and audit outputs
Chapter 15: Day 15 – Exam Cram and Practice Questions
An overview of exam cram and practice questions
References and further reading
Chapter 16: Day 16 – Security Operations - Foundational Concepts
An overview of operations security
The physical security design
Physical and operations security controls
Operations/facility security
Protecting and securing equipment
Chapter 17: Day 17 – Security Operations - Incident Management and Disaster Recovery
Incident management and reporting
Business Continuity Planning (BCP)
Disaster Recovery Planning (DRP)
Chapter 18: Day 18 – Software Development Security - Security in Software Development Life Cycle
An overview of software development security
Software development life cycle
Security in software development
Chapter 19: Day 19 – Software Development Security - Assessing effectiveness of Software Security
Security in information technology systems
Threats and vulnerabilities to application systems
Monitoring and testing activities
Chapter 20: Day 20 – Exam Cram and Practice Questions
Overview of exam cram and practice questions
References and further reading
Chapter 21: Day 21 – Exam Cram and Mock Test
An overview of the exam cram and mock test
References and further reading