Lesson 1 - Assessing Information Security Risk
• Topic A: Identify the Importance of Risk Management
• Topic B: Assess Risk
• Topic C: Mitigate Risk
• Topic D: Integrate Documentation into Risk Management
Lesson 2 - Creating an Information Assurance Lifecycle Process
• Topic A: Evaluate Information Assurance Lifecycle Models
• Topic B: Align Information Security Operations to the Information Assurance Lifecycle
• Topic C: Align Information Assurance and Compliance Regulations
Lesson 3 - Analyzing Threats to Computing and Network Environments
• Topic A: Identify Threat Analysis Models
• Topic B: Assess the Impact of Reconnaissance Incidents
• Topic C: Assess the Impact of Systems Hacking Attacks
• Topic D: Assess the Impact of Malware
• Topic E: Assess the Impact of Hijacking and Impersonation Attacks
• Topic F: Assess the Impact of Denial of Service Incidents
• Topic G: Assess the Impact of Threats to Mobile Infrastructure
• Topic H: Assess the Impact of Threats to Cloud Infrastructures
Lesson 4 - Designing Secure Computing and Network Environments
• Topic A: Information Security Architecture Design Principles
• Topic B: Design Access Control Mechanisms
• Topic C: Design Cryptographic Security Controls
• Topic D: Design Application Security
• Topic E: Design Computing Systems Security
• Topic F: Design Network Security
Lesson 5 - Operating Secure Computing and Network Environments
• Topic A: Implement Change Management in Security Operations
• Topic B: Implement Monitoring in Security Operations
• Topic C: Test and Evaluate Information Assurance Architectures
Lesson 6 - Assessing the Security Posture Within a Risk Management Framework
• Topic A: Deploy a Vulnerability Assessment and Management Platform
• Topic B: Conduct Vulnerability Assessments
• Topic C: Conduct Penetration Tests on Network Assets
• Topic D: Analyze and Report Penetration Test Results
Lesson 7 - Collecting Cybersecurity Intelligence Information
• Topic A: Deploy a Security Intelligence Collection and Analysis Platform
• Topic B: Sources
Lesson 8 - Analyzing Cybersecurity Intelligence Information
• Topic A: Analyze Security Intelligence to Address Incidents
• Topic B: Incorporate Security Intelligence and Event Management
Lesson 9 - Responding to Cybersecurity Incidents
• Topic A: Deploy an Incident Handling and Response Architecture
• Topic B: Perform Real-Time Incident Handling Tasks
• Topic C: Prepare for Forensic Investigation
Lesson 10 - Investigating Cybersecurity Incidents
• Topic A: Create a Forensics Investigation Plan
• Topic B: Securely Collect Electronic Evidence
• Topic C: Identify the Who, Why, and How of an Incident
• Topic D: Follow Up on the Results of an Investigation
Lesson 11 - Computing and Network Environments
• Topic A: Deploy a Systems and Processes Auditing Architecture
• Topic B: Maintain a Deployable Audit Toolkit
• Topic C: Perform Audits Geared Toward the Information Assurance Lifecycle