M-1 | Security Roles and Security Controls
- Compare and Contrast Information Security Roles | M1 | S1
- Compare and Contrast Security Control and Framework Types | M1 | S2
M-2 | Threat Actors and Threat Intelligence
- Explain Threat Actor Types and Attack Vectors | M2 | S1
- Explain Threat Intelligence Sources | M2 | S2
M-3 | Performing Security Assessments
- Assess Organizational Security with Network Reconnaissance Tools | M3 | S1
- Explain Security Concerns with General Vulnerability Types | M3 | S2
- Summarize Vulnerability Scanning Techniques | M3 | S3
- Explain Penetration Testing Concepts | M3 | S4
M-4 | Social Engineering and Malware
- Compare and Contrast Social Engineering Techniques | M4 | S1
- Analyze Indicators of Malware-based Attacks | M4 | S2
M-5 | Basic Cryptographic Concepts
- Compare and Contrast Cryptographic Ciphers | M5 | S1
- Summarize Cryptographic Modes of Operation | M5 | S2
- Summarize Cryptographic Use Cases and Weaknesses | M5 | S3
- Summarize Other Cryptographic Technologies | M5 | S4
M-6 | Public Key Infrastructure
- Implement Certificates and Certificate Authorities | M6 | S1
- Implement PKI Management | M6 | S2
M-7 | Authentication Controls
- Summarize Authentication Design Concepts | M7 | S1
- Implement Knowledge-based Authentication | M7 | S2
- Implement Authentication Technologies | M7 | S3
- Summarize Biometrics Authentication Concepts | M7 | S4
M-8 | Identity and Account Management Controls
- Implement Identity and Account Types | M8 | S1
- Implement Account Policies | M8 | S2
- Implement Authorization Solutions | M8 | S3
- Explain the Importance of Personnel Policies | M8 | S4
M-9 | Secure Network Designs
- Implement Secure Network Designs | M9 | S1
- Implement Secure Switching and Routing | M9 | S2
- Implement Secure Wireless Infrastructure | M9 | S3
- Implement Load Balancers | M9 | S4
M-10 | Network Security Appliances
- Implement Firewalls and Proxy Servers | M10 | S1
- Implement Network Security Monitoring | M10 | S2
- Summarize the Use of SIEM | M10 | S3
M-11 | Secure Network Protocols
- Implement Secure Network Operations Protocols | M11 | S1
- Implement Secure Application Protocols | M11 | S2
- Implement Secure Remote Access Protocols | M11 | S3
M-12 | Host Security Solutions
- Implement Secure Firmware | M12 | S1
- Implement Endpoint Security | M12 | S2
- Explain Embedded System Security Implications | M12 | S3
M-13 | Secure Mobile Solutions
- Implement Mobile Device Management | M13 | S1
- Implement Secure Mobile Device Connections | M13 | S2
M-14 | Secure Application Concepts
- Analyze Indicators of Application Attacks | M14 | S1
- Analyze Indicators of Web Application Attacks | M14 | S2
- Summarize Secure Coding Practices | M14 | S3
- Implement Secure Script Environments | M14 | S4
- Summarize Deployment and Automation Concepts | M14 | S5
M-15 | Secure Cloud Solutions
- Summarize Secure Cloud and Virtualization Services | M15 | S1
- Apply Cloud Security Solutions | M15 | S2
- Summarize Infrastructure as Code Concepts | M15 | S3
M-16 | Data Privacy and Protection Concepts
- Explain Privacy and Data Sensitivity Concepts | M16 | S1
- Explain Privacy and Data Protection Controls | M16 | S2
M-17 | Incident Response
- Summarize Incident Response Procedures | M17 | S1
- Utilize Appropriate Data Sources for Incident Response | M17 | S2
- Apply Mitigation Controls | M17 | S3
M-18 | Digital Forensics
- Explain Key Aspects of Digital Forensics Documentation | M18 | S1
- Explain Key Aspects of Digital Forensics Evidence Acquisition | M18 | S2
M-19 | Risk Management Concepts
- Explain Risk Management Processes and Concepts | M19 | S1
- Explain Business Impact Analysis Concepts | M19 | S2
M-20 | Cybersecurity Resilience
- Implement Redundancy Strategies | M20 | S1
- Implement Backup Strategies | M20 | S2
Doubt Clarification Session