- Key issues plaguing the cyber security (information security and network security)
- Information security threats, vulnerabilities, and attacks
- Different types of malware
- Network security fundamentals
- Network security controls:
- Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
- Physical controls (physical security controls, workplace security, and environmental controls)
- Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server,
- VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
- Identification, authentication, and authorization concepts
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and security measures
- Fundamentals of mobile, IoT, and OT devices and their security measures
- Cryptography and public key infrastructure concepts
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic monitoring, log monitoring and analysis for suspicious traffic
- Incident handling and response process
- Computer forensics fundaments, digital evidence, and forensic investigation phases
- Business continuity (BC) and disaster recovery (DR) concepts
- Risk management concepts, phases, and frameworks