| 1. Key issues plaguing the cybersecurity industry (information security and network security) |
| 2. Information security threats, vulnerabilities, and attacks |
| 3. Different types of malware |
| 4. Network security fundamentals |
| 5. Identification, authentication, and authorization concepts |
6. Network security controls - Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
- Physical controls (physical security controls, workplace security, and environmental controls)
- Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
|
| 7. Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management) |
| 8. Application security design and testing techniques |
| 9. Fundamentals of virtualization, cloud computing, and cloud security |
| 10. Wireless network fundamentals, wireless encryption, and security measures |
| 11. Fundamentals of mobile, IoT, and OT devices and their security measures |
| 12. Cryptography and public key infrastructure concepts |
| 13. Data security controls, data backup and retention methods, and data loss prevention techniques |
| 14. Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic |
| 15. Incident handling and response process |
| 16. Computer forensics fundaments, digital evidence, and forensic investigation phases |