1. Key issues plaguing the cybersecurity industry (information security and network security) |
2. Information security threats, vulnerabilities, and attacks |
3. Different types of malware |
4. Network security fundamentals |
5. Identification, authentication, and authorization concepts |
6. Network security controls - Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
- Physical controls (physical security controls, workplace security, and environmental controls)
- Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
|
7. Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management) |
8. Application security design and testing techniques |
9. Fundamentals of virtualization, cloud computing, and cloud security |
10. Wireless network fundamentals, wireless encryption, and security measures |
11. Fundamentals of mobile, IoT, and OT devices and their security measures |
12. Cryptography and public key infrastructure concepts |
13. Data security controls, data backup and retention methods, and data loss prevention techniques |
14. Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic |
15. Incident handling and response process |
16. Computer forensics fundaments, digital evidence, and forensic investigation phases |