This course contains 6 Domains as follows.
Domain 1: Network Security = 21%
Domain 2: Compliance and Operational Security = 18%
Domain 3: Threats and Vulnerabilities = 21%
Domain 4: Application, Data and Host Security = 16%
Domain 5: Access Control and Identify Management = 13%
Domain 6: Cryptography = 11%
1. Network Security
- VPN concentrators
- Firewall, proxy, network guard
- Antivirus software
- Authentication
- Web security gateways
- Routers, switches, load balancers
- NIDs and NIPs
- All in one security Application and spam filter
- Protocol analyzer
- Log analysis
- Secure router configuration
- Firewall rules
- Switch port security and 802 1x
- VLAN management
- Web application and firewall
- Secure router configuration
- Spanning tree protocol and Loop protection
- VLAN management
- Network separation
- ACL, FG, DMZ
- Network subnetting
- NAT, Remote access
- Network access control
- Cloud computing, virtualization
- IPv4 and IPv6 an DNS
- ICMP and SNMP
- HTTPs and TLS/SSL
- SSH and encrypted file transfer
- Common network ports
- WEP, WPA EAP, PEAP and LEAP
- MAC filtering and SSID management
- Wireless networking and antenna placement
2. Compliance and Operational Security
- Incident and change management
- Risk calculation, Risk avoidance, Cloud computing, virtualization Computing
- Security controls
- User right and permission
- Data lost and theft policy
- Order of volatility
- Network traffic and system image
- Time offset and Hashing
- Video capture, screen shoot and witness
- Chain of custody and first responders
- Data labeling, handling and disposal
- Expense and damage control
- Security training and policy and procedures
- User habit and threat awareness
- Social networking and P2P networking
- Redundancy and single point failure
- Planning, testing and operational continuity
- Disaster recovery and succession planning
- Sensitivity of data
- Compliance, Best practices and standards
- Business Impact analysis
- Personally identifiable information
- Planning, testing and operational continuity
- IT contingency planning
- HVAC and temperature Humidity
- Hot and Cold Aisles
- Back up
- Contingency plans
- Warm site, Cold site and Hot site
- Exemplify the concepts of confidentiality
- High availability and tolerance
- Recovery time objectives
3. Threats and Vulnerabilities
- Adware, Malware and Spyware
- Trojans and backdoor
- Virus and Worms
- Rootkits and Logic bomb
- Man in middle and ARP Poisoning
- Denial of services
- Phishing, Spam
- Christmas tree attack
- Insider threats
- Transitive and client side attack
- Dumpster diving
- Shoulder surfing
- Tailgating
- Impersonation
- Hoaxes and whaling and vishing
- Rogue access points and evil twins
- Wireless interference
- Wardriving and Warchalking
- Bluejacking and Bluesnarfing
- Initialization vector attack
- Wireless packet analysis
- Cross-sit scripting
- SQL injection, XML injection, LDAP injection
- Buffer overflow
- Directory traversal and command injection
- Malicious add-ons
- Zero-day attack
- Cookies, Header, Manipulation and session Hijacking
- Malicious adds on and E-mail attachment
- Physical security and Monitoring system
- Physical Port security
- Security posture and Reporting
- Prevention control vs. detection control
- Assess tools, types and techniques
- Penetration Testing
- Vulnerability scanning
- Identification of common misconfiguration
- Honeypots, honeynets, tarpits
- threat vs. likelihood
- others
4. Application, Data and Host Security
- Secure coding Concept
- Mobile device security
- Fuzzing
- Application patch management
- Application configuration, baselining and Hardening
- Best practice of anti-malware
- Hardware security
- Overview of virtualization
- Data loss prevention
- An overview of data encryption
- Hardware bases encryption
- TPM, HSM, USB encryption
5. Access Control and Identify Management
- Kerberos
- RADIUS and TACACS
- LDAP
- Identification and Authentication
- Single factor authentication
- Multi factor authentication
- Common access card
- Account policy enforcement and password management
- Implicit deny
- Trusted
- Account policy enforcement
- Group based privileges
- single Sign on
- Authorization and access control
- Trusted
- Account policy enforcement
- Privileges
- Common access card (CAC) and token
- Personal identification verification card and Smart card
- Time of day restrictions
- Account policy enforcement and password management
- Multifactor authentication
- Biometrics
- performing account management
- Identification vs. authentication
- PAP, CHAP, Kerberos, LDAP
- ACLs: Discretionary, mandatory, role and rule based
- Separation of duties
6. Cryptography
- Overview of cryptography
- Block and stream chippers
- Transport encryption and encryption algorithms
- Non-Repudiation
- Hashing
- Stenography
- Elliptic curve and quantum cryptography
- WEP vs. WPA
- Asymmetric encryption with PGP and GPG
- One time pads
- CHAP, PAP and NLTM
- Whole disk encryption
- Digital certificate
- Public key infra structure
- Public and private keys and key registration
- Trust model and Key escrow
- Implementing Key revocation
- Implementing PKI
- Public and private key implementing
- certificate management and associated component
- SSL/TLS, IPSec, SSH, HTTPS
- Asymmetric keys like this, RSA, El Gamal, ECC
- LANMAN, NTLM, NTLMv2 authentications