Part I Threats, Attacks, and Vulnerabilities
Chapter 1 Social Engineering Techniques
Chapter 2 Types of Attack Indicators
Chapter 3 Application Attack Indicators
Chapter 4 Network Attack Indicators
Chapter 5 Threat Actors, Vectors, and Intelligence Sources
Chapter 6 Vulnerabilities
Chapter 7 Security Assessments
Chapter 8 Penetration Testing
Part II Architecture and Design
Chapter 9 Enterprise Architecture
Chapter 10 Virtualization and Cloud Security
Chapter 11 Secure App Development, Deployment, and Automation Scripts
Chapter 12 Authentication and Authorization
Chapter 13 Cybersecurity Resilience
Chapter 14 Embedded and Specialized Systems
Chapter 15 Physical Security
Chapter 16 Cryptographic Concepts
Part III Implementation
Chapter 17 Secure Protocols
Chapter 18 Host and Application Security
Chapter 19 Secure Network Design
Chapter 20 Wireless Security
Chapter 21 Secure Mobile Solutions
Chapter 22 Implementing Cloud Security
Chapter 23 Identity and Account Management Controls
Chapter 24 Implementing Authentication and Authorization
Chapter 25 Public Key Infrastructure
Part IV Operations and Incident Response
Chapter 26 Tools/Assess Organizational Security
Chapter 27 Incident Response Policies and Procedures
Chapter 28 Investigations
Chapter 29 Mitigation Techniques and Controls
Chapter 30 Digital Forensics
Part V Governance, Risk, and Compliance
Chapter 31 Security Controls
Chapter 32 Regulations, Standards, and Frameworks
Chapter 33 Organizational Policies
Chapter 34 Risk Management
Chapter 35 Privacy