Acknowledgments |
|
xxiii | |
Introduction |
|
xxv | |
|
1.0 Threats, Attacks, and Vulnerabilities |
|
|
1 | (82) |
|
Objective 1.1 Compare and contrast different types of social engineering techniques |
|
|
2 | (9) |
|
Understanding Social Engineering |
|
|
2 | (1) |
|
Social Engineering Techniques |
|
|
2 | (1) |
|
|
3 | (2) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Objective 1.2 Given a scenario, analyze potential indicators to determine the type of attack |
|
|
11 | (15) |
|
Analyze and Differentiate Among Types of Malware |
|
|
11 | (1) |
|
|
12 | (3) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Malicious Code or Script Execution |
|
|
20 | (1) |
|
Analyze and Differentiate Among Types of Password Attacks |
|
|
21 | (2) |
|
Analyze and Differentiate Among Nonstandard and Emerging Attacks |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
Adversarial Artificial Intelligence |
|
|
24 | (1) |
|
Cloud-Based vs. On-Premises Attacks |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Objective 1.3 Given a scenario, analyze potential indicators associated with application attacks |
|
|
26 | (10) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Application Programming Interface Attacks |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
Objective 1.4 Given a scenario, analyze potential indicators associated with network attacks |
|
|
36 | (17) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Bluetooth Vulnerabilities |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
Access Points (Evil Twin) |
|
|
39 | (1) |
|
|
40 | (1) |
|
Packet Sniffing and Eavesdropping |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (2) |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Objective 1.5 Explain different threat actors, vectors, and intelligence sources |
|
|
53 | (7) |
|
Understanding and Analyzing Threats |
|
|
53 | (1) |
|
Actors, Attributes, and Vectors |
|
|
53 | (3) |
|
Threat Intelligence Sources |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Objective 1.6 Explain the security concerns associated with various types of vulnerabilities |
|
|
60 | (6) |
|
|
60 | (1) |
|
|
61 | (4) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Objective 1.7 Summarize the techniques used in security assessments |
|
|
66 | (9) |
|
Implement Assessment Techniques to Discover Security Threats and Vulnerabilities |
|
|
66 | (1) |
|
Vulnerability Assessment Tools and Techniques |
|
|
66 | (7) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
Objective 1.8 Explain the techniques used in penetration testing |
|
|
75 | (8) |
|
Penetration Testing Techniques |
|
|
75 | (2) |
|
Known, Unknown, and Partially Known Environment Testing |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (2) |
|
5.0 Governance, Risk, and Compliance |
|
|
83 | (64) |
|
Objective 5.1 Compare and contrast various types of controls |
|
|
84 | (3) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Objective 5.2 Explain the importance of applicable egulations, standards, or frameworks that impact organizational security posture |
|
|
87 | (6) |
|
Understanding Guidance Documents |
|
|
87 | (1) |
|
Regulations, Legislation, and Standards |
|
|
87 | (2) |
|
|
89 | (2) |
|
Benchmarks and Secure Configuration Guides |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
Objective 5.3 Explain the importance of policies to organizational security |
|
|
93 | (26) |
|
Policies Supporting Organizational Security |
|
|
93 | (1) |
|
Using Organizational Policies to Reduce Risk |
|
|
93 | (8) |
|
Security Training and Awareness Policies |
|
|
101 | (5) |
|
Data and Documentation Policies |
|
|
106 | (5) |
|
|
111 | (4) |
|
Change Management Policies |
|
|
115 | (1) |
|
|
115 | (1) |
|
Third-Party Risk Management |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Objective 5.4 Summarize risk management processes and concepts |
|
|
119 | (20) |
|
Understanding and Managing Risk |
|
|
120 | (1) |
|
|
120 | (8) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Functional Recovery Plans |
|
|
130 | (5) |
|
High Availability and Redundancy Planning |
|
|
135 | (3) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Objective 5.5 Explain privacy and sensitive data concepts in relation to security |
|
|
139 | (8) |
|
Privacy and Sensitive Data |
|
|
140 | (1) |
|
Organizational Consequences of Privacy and Data Breaches |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
142 | (2) |
|
Privacy Enhancing Technologies |
|
|
144 | (1) |
|
Data Ownership Roles and Responsibilities |
|
|
144 | (1) |
|
Terms of Agreement and Privacy Notices |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
2.0 Architecture and Design |
|
|
147 | (96) |
|
Objective 2.1 Explain the importance of security concepts in an enterprise environment |
|
|
148 | (11) |
|
|
148 | (1) |
|
Change and Configuration Management |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Objective 2.2 Summarize virtualization and cloud computing concepts |
|
|
159 | (7) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (3) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Objective 2.3 Summarize secure application development, deployment, and automation concepts |
|
|
166 | (9) |
|
Secure Application Development, Deployment, and Automation |
|
|
166 | (1) |
|
Development Life-Cycle Models |
|
|
167 | (1) |
|
|
167 | (7) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Objective 2.4 Summarize authentication and authorization design concepts |
|
|
175 | (10) |
|
|
176 | (1) |
|
Multifactor Authentication |
|
|
177 | (1) |
|
|
178 | (4) |
|
|
182 | (1) |
|
Cloud vs. On-Premises Requirements |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
Objective 2.5 Given a scenario, implement cybersecurity resilience |
|
|
185 | (16) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (7) |
|
|
194 | (5) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Objective 2.6 Explain the security implications of embedded and specialized systems |
|
|
201 | (6) |
|
Embedded and Specialized Systems |
|
|
201 | (1) |
|
|
201 | (2) |
|
Industrial Control Systems and Supervisory Control and Data Acquisition Systems |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Heating, Ventilation, and Air Conditioning Systems |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
Objective 2.7 Explain the importance of physical security controls |
|
|
207 | (14) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (3) |
|
Objective 2.8 Summarize the basics of cryptographic concepts |
|
|
221 | (22) |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
225 | (9) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (3) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (3) |
|
|
243 | (138) |
|
Objective 3.1 Given a scenario, implement secure protocols |
|
|
244 | (10) |
|
|
244 | (1) |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
Objective 3.2 Given a scenario, implement host or application security solutions |
|
|
254 | (28) |
|
Host and Application Security |
|
|
254 | (1) |
|
|
254 | (10) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (5) |
|
|
271 | (9) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
Objective 3.3 Given a scenario, implement secure network designs |
|
|
282 | (27) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (4) |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (4) |
|
Hardware Security Modules |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (4) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (3) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Objective 3.4 Given a scenario, install and configure wireless security settings |
|
|
309 | (11) |
|
|
310 | (1) |
|
|
310 | (2) |
|
|
312 | (4) |
|
|
316 | (1) |
|
Installation Considerations |
|
|
317 | (2) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
Objective 3.5 Given a scenario, implement secure mobile solutions |
|
|
320 | (17) |
|
Mobile Security Solutions |
|
|
320 | (1) |
|
Connection Methods and Receivers |
|
|
320 | (3) |
|
|
323 | (4) |
|
|
327 | (1) |
|
Enforcement and Monitoring |
|
|
328 | (5) |
|
|
333 | (3) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
Objective 3.6 Given a scenario, apply cybersecurity solutions to the cloud |
|
|
337 | (9) |
|
|
338 | (1) |
|
|
338 | (5) |
|
|
343 | (2) |
|
Cloud Native Controls vs. Third-Party Solutions |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
Objective 3.7 Given a scenario, implement identity and account management controls |
|
|
346 | (10) |
|
Identity and Account Management |
|
|
347 | (1) |
|
|
347 | (2) |
|
|
349 | (1) |
|
|
350 | (5) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
Objective 3.8 Given a scenario, implement authentication and authorization solutions |
|
|
356 | (12) |
|
Authentication and Authorization |
|
|
356 | (1) |
|
Authentication Management |
|
|
357 | (2) |
|
|
359 | (5) |
|
|
364 | (4) |
|
Objective 3.9 Given a scenario, implement public key infrastructure |
|
|
368 | (13) |
|
Public Key Infrastructure |
|
|
369 | (1) |
|
|
370 | (4) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (3) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
4.0 Operations and Incident Response |
|
|
381 | (58) |
|
Objective 4.1 Given a scenario, use the appropriate tool to assess organizational security |
|
|
382 | (14) |
|
Assessing Organizational Security |
|
|
382 | (1) |
|
Network Reconnaissance and Discovery |
|
|
382 | (6) |
|
|
388 | (1) |
|
Shell and Script Environments |
|
|
389 | (1) |
|
Packet Capture and Replay |
|
|
389 | (2) |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
Objective 4.2 Summarize the importance of policies, processes, and procedures for incident response |
|
|
396 | (11) |
|
|
396 | (1) |
|
|
397 | (1) |
|
Incident Response Process |
|
|
397 | (2) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
Continuity of Operations Planning |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
Objective 4.3 Given an incident, utilize appropriate data sources to support an investigation |
|
|
407 | (14) |
|
|
407 | (1) |
|
Vulnerability Scan Output |
|
|
407 | (1) |
|
|
407 | (3) |
|
|
410 | (6) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
Objective 4.4 Given an incident, apply mitigation techniques or controls to secure an environment |
|
|
421 | (7) |
|
|
421 | (1) |
|
Reconfigure Endpoint Security Solutions |
|
|
421 | (2) |
|
|
423 | (2) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
Security Orchestration, Automation, and Response |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
Objective 4.5 Explain the key aspects of digital forensics |
|
|
428 | (11) |
|
|
428 | (1) |
|
Documentation and Evidence |
|
|
428 | (3) |
|
Acquisition and Preservation |
|
|
431 | (3) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (2) |
|
A About the Online Content |
|
|
439 | (4) |
|
|
439 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
439 | (1) |
|
|
439 | (1) |
|
Single User License Terms and Conditions |
|
|
439 | (2) |
|
|
441 | (1) |
|
|
441 | (2) |
Index |
|
443 | |