Part 1: Threats, Attacks and Vulnerabilities
Chapter 1: Malware and indicators of compromise
Chapter 2: Types of attacks
Chapter 3: Threats
Chapter 4: Vulnerability scanning and penetration testing
Chapter 5: Vulnerabilities and Impacts
Part 2: Technologies and Tools
Chapter 6: Network components
Chapter 7: Security tools and technologies
Chapter 8: Troubleshoot common security issues
Chapter 9: Deploy mobile devices securely
Chapter 10: Implementing secure protocols
Part 3: Architecture and Design
Chapter 11: Architecture frameworks and secure network architectures
Chapter 12: Secure systems design and deployment
Chapter 13: Embedded systems
Chapter 14: Application development and deployment
Chapter 15: Cloud and virtualization
Chapter 16: Resiliency and Automation strategies
Chapter 17: Physical security controls
Part 4: Identity and Access Management
Chapter 18: Identity, access and accounts
Chapter 19: Identity and access services
Chapter 20: Identity and access management controls
Part 5: Risk Management
Chapter 21: Policies, plans and procedures
Chapter 22: Risk management and business impact analysis concepts
Chapter 23: Incident response, disaster recovery and continuity of operation
Chapter 24: Digital forensics
Chapter 25: Compare and contrast various types of controls
Chapter 26: Data security and privacy practices
Part 6: Cryptography and PKI
Chapter 27: Basic concepts of cryptography
Chapter 28: Cryptography algorithms
Chapter 29: Wireless security
Chapter 30: Public key infrastructure
Part 7: Apendices
Appendix A: OSI Model and Internet Protocols
Appendix B: About the CD
Glossary