Week 1:
Chapter 1: Understanding Threats, Attacks, and Vulnerabilities
Week 2:
Chapter 2: Analyzing Attacks
Week 3:
Chapter 3: Architecture and Design
Week 4:
Chapter 4: Physical and System Security
Chapter 5: Cryptography
Week 5:
Chapter 6: Implementing Secure Networks
Week 6:
Chapter 7: Implementing Secure Hosts and Identities
Week 7:
Chapter 8: Operational Procedures
Chapter 9: Incident Response and Forensics
Week 8:
Chapter 10: Governance, Risk, and Compliance
Week 9:
COURSE INTRODUCTION
DOMAIN 1: Security Architecture.
• Topic 1.1: Securing Network Architecture
• Topic 1.2: Infrastructure Security Design
• Topic 1.3: Applications Security and Integration
Week 10:
DOMAIN 1: Security Architecture (continued)
• Topic 1.4: Data Security Techniques
• Topic 1.5: Authentication and Authorization Controls
• Topic 1.6: Cloud and Virtualization Solutions
Week 11:
DOMAIN 1: Security Architecture (continued)
• Topic 1.7: Cryptography and Public Key Infrastructure (PKI)
• Topic 1.8: Impact of Emerging Technologies on Security and Privacy
Week 12:
DOMAIN 2: Security Operations.
• Topic 2.1: Threat Management
• Topic 2.2: Indicators of Compromise and Responses
• Topic 2.3: Vulnerability Management
Week 13:
DOMAIN 2: Security Operations (continued)
• Topic 2.4: Vulnerability Assessment, Penetration Testing, and Tools
• Topic 2.5: Vulnerabilities and Attacks
• Topic 2.6: Processes for Risk Reduction
Week 14:
DOMAIN 2: Security Operations (continued)
• Topic 2.7: Incident Management
• Topic 2.8: Digital Forensic Concepts
• Topic 2.9: Forensic Analysis Tools
Week 15:
DOMAIN 3: Security Engineering and Cryptography.
• Topic 3.1: Secure Configurations for Enterprise Mobility
• Topic 3.2: Endpoint Security
Week 16:
DOMAIN 3: Security Engineering and Cryptography.
• Topic 3.3: Security Considerations and Impacts
• Topic 3.4: Cloud Adoption and Impacts
• Topic 3.5: Public Key Infrastructure (PKI)
• Topic 3.6: Cryptographic Algorithms and Protocols
Week 17:
DOMAIN 4: Governance, Risk, and Compliance.
• Topic 4.1: Risk Management
• Topic 4.2: Governance & Compliance Strategies
• Topic 4.3: Business Continuity & Disaster Recovery
Week 18:
Domain 1 – Penetration Testing
Week 19:
Domain 2 – Planning and Scoping
Week 20:
Domain 3 – Information Gathering and Vulnerability Scanning
Week 21:
Domain 4 – Attacks and Exploits
Week 22:
Domain 5 – Reporting and Communication
Week 23:
Domain 5 – Reporting and Communication
Week 24:
Domain 6 – Tools and Code Analysis
Week 25:
Domain 6 – Tools and Code Analysis