Table of Contents
- Designing a Secure Network Architecture
- Integrating Software Applications into the Enterprise
- Enterprise Data Security, Including Secure Cloud and Virtualization Solutions
- Deploying Enterprise Authentication and Authorization Controls
- Threat and Vulnerability Management
- Vulnerability Assessment and Penetration Testing Methods and Tools
- Risk Mitigation Controls
- Implementing Incident Response and Forensics Procedures
- Enterprise Mobility and Endpoint Security Controls
- Security Considerations Impacting Specific Sectors and Operational Technologies
- Implementing Cryptographic Protocols and Algorithms
- Implementing Appropriate PKI Solutions, Cryptographic Protocols, and Algorithms for Business Needs
- Applying Appropriate Risk Strategies
- Compliance Frameworks, Legal Considerations, and Their Organizational Impact
- Business Continuity and Disaster Recovery Concepts
- Mock Exam 1
- Mock Exam 2

