Understanding Security Fundamentals
1
CTS – Security Fundamentals
2
CTS – Comparing Control Types
3
CTS – Physical Security Controls
4
CTS – Understanding Digital Forensics
Implementing Public Key Infrastructure
1
CTS – PKI Concepts
2
CTS – Asymmetric and Symmetric Encryption
3
CTS – Key Stretching Algorithms
4
CTS – Salting Passwords
5
CTS – Cipher Modes
6
CTS – Quantum Computing
7
CTS – Blockchain and the Public Ledger
8
CTS – Hashing and Data Integrity
9
CTS – Comparing and Contrasting the Basic Concepts of Cryptography
10
CTS – Basic Cryptographic Terminologies
11
CTS – Common Use Cases for Cryptography
Investigating Identity and Access Management
1
CTS – Understanding Identity and Access Management Concepts
2
CTS – Identity Types
3
CTS – Account Types
4
CTS – Authentication Types
5
CTS – Implementing Authentication and Authorization Solutions
6
CTS – Summarizing Authentication and Authorization Design Concepts
7
CTS – Cloud versus On-Premises Authentication
8
CTS – Common Account Management Policies
9
CTS – Practical Exercise – Password Policy
Exploring Virtualization and Cloud Concepts
1
CTS – Overview of Cloud Computing
2
CTS – Implementing Different Cloud Deployment Models
3
CTS – Understanding Cloud Service Models
4
CTS – Understanding Cloud Computing Concepts
5
CTS – Understanding Cloud Storage Concepts
6
CTS – Selecting Cloud Security Controls
7
CTS – Exploring the Virtual Network Environments
Monitoring | Scanning and Penetration Testing
1
CTS – Penetration Testing Concepts
2
CTS – Passive and Active Reconnaissance
3
CTS – Exercise Types
4
CTS – Vulnerability Scanning Concepts
5
CTS – Syslog/Security Information and Event Management
6
CTS – Security Orchestration, Automation, and Response
Understanding Secure and Insecure Protocols
1
CTS – Introduction to Protocols
2
CTS – Insecure Protocols and Their Use Cases
3
CTS – Secure Protocols and Their Use Cases
4
CTS – Additional Use Cases and Their Protocols
Delving into Network and Security Concepts
1
CTS – Installing and Configuring Network Components
2
CTS – Remote Access Capabilities
3
CTS – Secure Network Architecture Concepts
4
CTS – Network Reconnaissance and Discovery
5
CTS – Forensic Tools
6
CTS – IP Addressing
Securing Wireless and Mobile Solutions
1
CTS – Implementing Wireless Security
2
CTS – Wireless Access Point Controllers
3
CTS – Deploying Mobile Devices Securely
4
CTS – Mobile Device Connection Methods
Identifying Threats | Attacks and Vulnerabilities
1
CTS – Virus and Malware Attacks
2
CTS – Social Engineering Attacks
3
CTS – Threat Actors
4
CTS – Advanced Attacks
Governance | Risk and Compliance
1
CTS – Risk Management Processes and Concepts
2
CTS – Threat Actors, Vectors, and Intelligence Concepts
3
CTS – The Importance of Policies for Organizational Security
4
CTS – Regulations, Standards, and Legislation
5
CTS – Privacy and Sensitive Data Concepts
Managing Application Security
1
CTS – Implementing Host or Application Security
2
CTS – Understanding the Security Implications of Embedded and Specialist Systems
3
CTS – Understanding Secure Application Development, Deployment, and Automation
Dealing with Incident Response Procedures
1
CTS – Incident Response Procedures
2
CTS – Utilizing Data Sources to Support Investigations
3
CTS – Knowing How to Apply Mitigation Techniques or Controls to Secure an Environment
4
CTS – Implementing Cybersecurity Resilience