Course Content :
Lesson 1: Controlling Access to Information Systems
Topic 1A: Control Data Access
Topic 1B: Control System Access
Topic 1C: Determine an Access Control Administration Method
Topic 1D: Perform a Penetration Test
Lesson 2: Networking Systems and Telecommunications
Topic 2A: Design Data Networks
Topic 2B: Provide Remote Access to a Data Network
Topic 2C: Secure a Data Network
Topic 2D: Manage a Data Network
Lesson 3: Defining Security Management
Topic 3A: Determine Security Management Goals
Topic 3B: Classify Information
Topic 3C: Develop a Security Program
Topic 3D: Manage Risk
Lesson 4: Creating Applications Security
Topic 4A: Perform Software Configuration Management
Topic 4B: Implement Software Controls
Topic 4C: Secure Database Systems
Lesson 5: Performing Cryptography
Topic 5A: Apply a Basic Cipher
Topic 5B: Select a Symmetric Key Cryptography Method
Topic 5C: Select an Asymmetric Key Cryptography Method
Topic 5D: Determine Email Security
Topic 5E: Determine Internet Security
Lesson 6: Securing System Architecture
Topic 6A: Evaluate Security Models
Topic 6B: Choose a Security Mode
Topic 6C: Provide System Assurance
Lesson 7: Executing Operations Security
Topic 7A: Control Operations Security
Topic 7B: Audit and Monitor Systems
Topic 7C: Handle Threats and Violations
Lesson 8: Performing Business Continuity Planning
Topic 8A: Sustain Business Processes
Topic 8B: Perform Business Impact Analysis
Topic 8C: Define Disaster Recovery Strategies
Topic 8D: Test the Disaster Recovery Plan
Lesson 9: Applying Physical Security
Topic 9A: Control Physical Access
Topic 9B: Monitor Physical Access
Topic 9C: Establish Physical Security Methods
Topic 9D: Design Secure Facilities
Lesson 10: Applying Law, Investigations, and Ethics
Topic 10A: Interpret Computer Crime Laws and Regulations
Topic 10B: Apply the Evidence Life Cycle
Topic 10C: Perform an Investigation
Topic 10D: Identify Codes of Conduct
Subscribe to:
Post Comments (Atom)

No comments:
Post a Comment