Security+ – Class Outline
PART 1: THREATS, ATTACKS, AND VULNERABILITIES
- Chapter 1: Malware and Indicators of Compromise
- Chapter 2: Attacks
- Chapter 3: Threat Actors
- Chapter 4: Vulnerability Scanning and Penetration Testing
- Chapter 5: Vulnerabilities and Impacts
PART 2: TECHNOLOGY AND TOOLS
- Chapter 6: Network Components
- Chapter 7: Security Tools and Technologies
- Chapter 8: Troubleshooting Common Security Issues
- Chapter 9: Mobile Devices
- Chapter 10: Implementing Secure Protocols
PART 3: ARCHITECTURE AND DESIGN
- Chapter 11: Architecture Frameworks and Secure Network Architectures
- Chapter 12: Secure Systems Design and Deployment
- Chapter 13: Embedded Systems
- Chapter 14: Application Development and Deployment
- Chapter 15: Cloud and Virtualization
- Chapter 16: Resiliency and Automation Strategies
- Chapter 17: Physical Security Controls
PART 4: IDENTITY AND ACCESS MANAGEMENT
- Chapter 18: Identity, Access, and Accounts
- Chapter 19: Identity and Access Services
- Chapter 20: Identity and Access Management Controls
PART 5: RISK MANAGEMENT
- Chapter 21: Policies, Plans and Procedures
- Chapter 22: Risk Management and Business Impact Analysis
- Chapter 23: Incident Response, Disaster Recovery, and Continuity of Operations
- Chapter 24: Digital Forensics
- Chapter 25: Data Security and Privacy Practices
PART 6: CRYPTOGRAPHY AND PUBLIC KEY INFRASTRUCTURE
- Chapter 26: Cryptographic Concepts
- Chapter 27: Cryptographic Algorithms
- Chapter 28: Wireless Security
- Chapter 29: Public Key Infrastructure