Introduction |
|
xix | |
|
Chapter 1 Threats, Attacks, And Vulnerabilities |
|
|
1 | (122) |
|
1.1 Compare and contrast different types of social engineering techniques |
|
|
5 | (15) |
|
1.2 Given a scenario, analyze potential indicators to determine the type of attack |
|
|
20 | (17) |
|
1.3 Given a scenario, analyze potential indicators associated with application attacks |
|
|
37 | (20) |
|
1.4 Given a scenario, analyze potential indicators associated with network attacks |
|
|
57 | (23) |
|
1.5 Explain different threat actors, vectors, and intelligence sources |
|
|
80 | (11) |
|
1.6 Explain the security concerns associated with various types of vulnerabilities |
|
|
91 | (8) |
|
1.7 Summarize the techniques used in security assessments |
|
|
99 | (10) |
|
1.8 Explain the techniques used in penetration testing |
|
|
109 | (9) |
|
|
118 | (5) |
|
Chapter 2 Architecture And Design |
|
|
123 | (122) |
|
2.1 Explain the importance of security concepts in an enterprise environment |
|
|
128 | (11) |
|
2.2 Summarize virtualization and cloud computing concepts |
|
|
139 | (13) |
|
2.3 Summarize secure application development, deployment, and automation concepts |
|
|
152 | (15) |
|
2.4 Summarize authentication and authorization design concepts |
|
|
167 | (16) |
|
2.5 Given a scenario, implement cybersecurity resilience |
|
|
183 | (13) |
|
2.6 Explain the security implications of embedded and specialized systems |
|
|
196 | (12) |
|
2.7 Explain the importance of physical security controls |
|
|
208 | (12) |
|
2.8 Summarize the basics of cryptographic concepts |
|
|
220 | (20) |
|
|
240 | (5) |
|
|
245 | (130) |
|
3.1 Given a scenario, implement secure protocols |
|
|
248 | (14) |
|
3.2 Given a scenario, implement host or application security solutions |
|
|
262 | (18) |
|
3.3 Given a scenario, implement secure network designs |
|
|
280 | (24) |
|
3.4 Given a scenario, install and configure wireless security settings |
|
|
304 | (11) |
|
3.5 Given a scenario, implement secure mobile solutions |
|
|
315 | (15) |
|
3.6 Given a scenario, apply cybersecurity solutions tothe cloud |
|
|
330 | (6) |
|
3.7 Given a scenario, implement identity and account management controls |
|
|
336 | (8) |
|
3.8 Given a scenario, implement authentication and authorization solutions |
|
|
344 | (11) |
|
3.9 Given a scenario, implement public key infrastructure |
|
|
355 | (15) |
|
|
370 | (5) |
|
Chapter 4 Operations And Incident Response |
|
|
375 | (66) |
|
4.1 Given a scenario, use the appropriate tool to assess organizational security |
|
|
377 | (21) |
|
4.2 Summarize the importance of policies, processes, and procedures for incident response |
|
|
398 | (11) |
|
4.3 Given an incident, utilize appropriate data sources to support an investigation |
|
|
409 | (9) |
|
4.4 Given an incident, apply mitigation techniques or controls to secure an environment |
|
|
418 | (4) |
|
4.5 Explain the key aspects of digital forensics |
|
|
422 | (13) |
|
|
435 | (6) |
|
Chapter 5 Governance, Risk, And Compliance |
|
|
441 | (58) |
|
5.1 Compare and contrast various types of controls |
|
|
443 | (3) |
|
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture |
|
|
446 | (10) |
|
5.3 Explain the importance of policies to organizational security |
|
|
456 | (13) |
|
5.4 Summarize risk management processes and concepts |
|
|
469 | (17) |
|
5.5 Explain privacy and sensitive data concepts in relation to security |
|
|
486 | (8) |
|
|
494 | (5) |
|
Appendix: Answers to Review Questions |
|
|
499 | (20) |
|
Chapter 1 Threats, Attacks, And Vulnerabilities |
|
|
500 | (5) |
|
Chapter 2 Architecture And Design |
|
|
505 | (3) |
|
|
508 | (3) |
|
Chapter 4 Operations And Incident Response |
|
|
511 | (3) |
|
Chapter 5 Governance, Risk, And Compliance |
|
|
514 | (5) |
Index |
|
519 | |