Course Outline
1 – Perform Risk Management Activities
- Topic 1A Explain Risk Assessment Methods Exam objectives covered 4.1 Given a set of requirements, apply the appropriate risk strategies
- Topic 1B Summarize the Risk Lifecycle Exam objectives covered 4.1 Given a set of requirements, apply the appropriate risk strategies
- Topic 1C Assess & Mitigate Vendor Risk Exam objectives covered 4.2 Explain the importance of managing and mitigating vendor risk.
2 – Summarizing Governance & Compliance Strategies
- Topic 2A Meet Cloud Identifying Critical Data Assets Exam objectives covered 4.3 Explain compliance frameworks and legal considerations, and their organizational impact.
- Topic 2B Design Compare and Contrast Regulation, Accreditation, and Standards Exam objectives covered 4.3 Explain compliance frameworks and legal considerations, and their organizational impact.
- Topic 2C Explain Legal Considerations & Contract Types Exam objectives covered 4.3 Explain compliance frameworks and legal considerations, and their organizational impact.
3 – Implementing Business Continuity & Disaster Recovery
- Topic 3A Explain the Role of Business Impact Analysis Exam objectives covered: 4.4 Explain the importance of business continuity and disaster recovery concepts.
- Topic 3B Assess Disaster Recovery Plans Exam objectives covered 4.4 Explain the importance of business continuity and disaster recovery concepts.
- Topic 3C Explain Testing and Readiness Activities Exam objectives covered 4.4 Explain the importance of business continuity and disaster recovery concepts.
4 – Identifying Infrastructure Services
- Topic 4A Explain Critical Network Services Exam objectives covered 1.1 Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.
- Topic 4B Explain Defensible Network Design Exam objectives covered 1.1 Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network.
- Topic 4C Implement Durable Infrastructures Exam objectives covered 1.2 Given a scenario, analyze the organizational requirements to determine the proper infrastructure security design.
5 – Performing Software Integration
- Topic 5A Explain Secure Integration Activities Exam objectives covered 1.3 Given a scenario, integrate software applications securely into an enterprise architecture.
- Topic 5B Assess Software Development Activities Exam objectives covered 1.3 Given a scenario, integrate software applications securely into an enterprise architecture
- Topic 5C Analyze Access Control Models & Best Practices Exam objectives covered 1.5 Given a scenario, analyze the security requirements and objectives to provide the appropriate authentication and authorization controls.
- Topic 5D Analyze Development Models & Best Practices Exam objectives covered 1.4 Given a scenario, implement data security techniques for securing enterprise architecture.
6 – Explain Virtualization, Cloud, and Emerging Technology
- Topic 6A Explain Virtualization and Cloud Technology Exam objectives covered 1.6 Given a set of requirements, implement secure cloud and virtualization solutions
- Topic 6B Explain Emerging Technologies Exam objectives covered 1.8 Explain the impact of emerging technologies on enterprise security and privacy.
7 – Exploring Secure Configurations and System Hardening
- Topic 7A Analyze Enterprise Mobility Protections Exam objectives covered 3.1 Given a scenario, apply secure configurations to enterprise mobility
- Topic 7B Implement Endpoint Protection Exam objectives covered 3.2 Given a scenario, configure and implement endpoint security controls.
8 – Understanding Security Considerations of Cloud and Specialized Platforms
- Topic 8A Understand Impacts of Cloud Technology Adoption Exam objectives covered 3.4 Explain how cloud technology adoption impacts organizational security.
- Topic 8B Explain Security Concerns for Sector-Specific Technologies Exam objectives covered 3.3 Explain security considerations impacting specific sectors and operational technologies.
9 – Implementing Cryptography
- Topic 9A Implementing Hashing and Symmetric Algorithms Exam objectives covered 3.6 Given a business requirement, implement the appropriate cryptographic protocols and algorithms.
- Topic 9B Implementing Appropriate Asymmetric Algorithms and Protocols Exam objectives covered
- 3.6 Given a business requirement, implement the appropriate cryptographic protocols and algorithms.
10 – Implementing Public Key Infrastructure (PKI)
- Topic 10A Analyze Objectives of Cryptography and Public Key Infrastructure (PKI) Exam objectives covered 1.7 Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements.
- Topic 10B Implementing Appropriate PKI Solutions Exam objectives covered 3.5 Given a business requirement, implement the appropriate PKI solution. 3.7 Given a scenario, troubleshoot issues with cryptographic implementations.
11 – Understanding Threat and Vulnerability Management Activities
- Topic 11A Explore Threat and Vulnerability Management Concepts Exam objectives covered
- 2.1 Given a scenario, perform threat management activities. 2.3 Given a scenario, perform vulnerability management activities.
- Topic 11B Explain Vulnerability and Penetration Test Methods Exam objectives covered 2.4 Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.
- Topic 11C Explain Technologies Designed to Reduce Risk Exam objectives covered 2.6 Given a scenario, use processes to reduce risk
12 – Developing Incident Response Capabilities
- Topic 12A Analyzing and Mitigating Vulnerabilities
- Exam objectives covered 2.5 Given a scenario, analyze vulnerabilities and recommend risk mitigations.
- Topic 12B Identifying and Responding to Indicators of Compromise Exam objectives covered 2.2 Given a scenario, analyze indicators of compromise and formulate an appropriate response. 2.7 Given an incident, implement the appropriate response.
- Topic 12C Exploring Digital Forensic Concepts Exam objectives covered 2.8 Explain the importance of forensic concepts. 2.9 Given a scenario, use forensic analysis tools.
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Learning Objectives
In this course students will gain knowledge in:
-
- Supporting IT Governance and Risk Management
-
- Leveraging Collaboration to Support Security
-
- Using Research and Analysis to Secure the Enterprise
-
- Integrating Advanced Authentication and Authorization Techniques
-
- Implementing Cryptographic Techniques
-
- Implementing Security Controls for Hosts
-
- Implementing Security Controls for Mobile Devices
-
- Implementing Network Security
-
- Implementing Security in the Systems and Software Development Lifecycle
-
- Integrating Assets in a Secure Enterprise Architecture
-
- Conducting Security Assessments
-
- Responding to and Recovering from Incidents
No special instructions regarding this course's target audience provided. Please contact us to discuss if you are unsure whether this course is for you!
No special prerequisites for this course provided. If you are unsure whether you might need to take another course first, please contact us to discuss.
Ten (10) business days’ notice is required to reschedule a class with no additional fees. Notify TOPTALENT LEARNING as soon as possible at 469-721-6100 or by written notification to info@toptalentlearning.com to avoid rescheduling penalties.
Please contact our team at 469-721-6100; we will gladly guide you through the online purchasing process.
You will receive a receipt and an enrollment confirmation sent to the email you submitted at purchase. Your enrollment email will have instructions on how to access the class. Any additional questions our team is here to support you. Please call us at 469-721-6100.
If a student is 15 minutes late, they risk losing their seat to a standby student. If a student is 30 minutes late or more, they will need to reschedule. A no-show fee will apply. Retakes are enrolled on a stand-by basis. The student must supply previously issued courseware. Additional fees may apply.
You will receive a ‘Certificate of Completion’ once you complete the class. If you purchased an exam voucher for the class, a team member from TOPTALENT LEARNING will reach out to discuss your readiness for the voucher and make arrangements to send it.