Objectives

  • 1.0 General Security Concepts
    •  1.1 Compare and contrast various types of security controls
      • Categories (Technical, Managerial, Operational, Physical)
      • Control types (Preventive, Deterrent, Detective, Corrective, Compensating, Directive)
    • 1.2 Summarize fundamental security concepts
      • Confidentiality, Integrity, and Availability (CIA)
      • Non-­ repudiation
      • Authentication, Authorization, and Accounting (AAA) (Authenticating people, authenticating systems, authorization models)
      • Gap analysis
      • Zero trust (control plane, data plane)
      • Physical security (bollards, access control vestibule, fencing, video surveillance, security guard, access badge, lighting, sensors)
      • Deception and disruption technology (honeypot, honeynet, honeyfile, honeytoken)
    • 1.3 Explain the importance of change management processes and the impact to security
      • Business processes impacting security operations (approval process, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, standard operating procedure)
      • Technical implications (allow lists/deny lists, restricted activities, downtime, service restart, application restart, legacy applications, dependencies)
      • Documentation (updating diagrams, updating policies/procedures)
      • Version control
    • 1.4 Explain the importance of using appropriate cryptographic solutions
      • Public key infrastructure (PKI) (Public key, private, key, key escrow)
      • Encryption (Level, transport/communication, asymmetric, symmetric, key exchange, algorithms, key length)
      • Tools (Trusted Platform Module [TPM], Hardware security module [HSM], key management systems, secure enclave)
      • Obfuscation (Steganography, tokenization, data masking)
      • Hashing
      • Salting
      • Digital Signatures
      • Key stretching
      • Blockchain
      • Open public ledger
      • Certificates (certificate authorities, certificate revocation lists [CRLs], Online Certificate Status Protocol [OCSP], self-­signed, third-­party, root of trust, certificate signing request [CSR] generation, wildcard)
  • 2.0 Threats, Vulnerabilities, and Mitigations
  • 3.0 Security Architecture
  • 4.0 Security Operations
  • 5.0 Security Program Management and Oversight