Domain |
Percentage of Examination |
1.0 Threats, Attacks and Vulnerabilities |
21% |
2.0 Technologies and Tools |
22% |
3.0 Architecture and Design |
15% |
4.0 Identity and Access management |
16% |
5.0 Risk management |
14% |
6.0 Cryptography and PKI |
12% |
Total |
100% |
- Threats, Attacks and Vulnerabilities
- Given a scenario, analyze indicators of compromise and determine the type of malware.
- Compare and contrast types of attacks.
- Explain threat actor types and attributes.
- Explain penetration testing concepts.
- Explain vulnerability scanning concepts.
- Explain the impact associated with types of vulnerabilities.
- Technologies and Tools
- Install and configure network components, both hardwareand software-based, to support organizational security.
- Given a scenario, use appropriate software tools to assess the security posture of an organization.
- Given a scenario, troubleshoot common security issues.
- Given a scenario, analyze and interpret output from security technologies.
- Given a scenario, deploy mobile devices securely.
- Given a scenario, implement secure protocols.
- Architecture and Design
- Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- Given a scenario, implement secure network architecture concepts.
- Given a scenario, implement secure systems design.
- Explain the importance of secure staging deployment concepts.
- Explain the security implications of embedded systems.
- Summarize secure application development and deployment concepts.
- Summarize cloud and virtualization concepts.
- Explain how resiliency and automation strategies reduce risk.
- Explain the importance of physical security controls.
- Identity and Access Management.
- Compare and contrast identity and access management concepts
- Given a scenario, install and configure identity and access services.
- Given a scenario, implement identity and access management controls.
- Given a scenario, differentiate common account management practices.
- Risk Management
- Explain the importance of policies, plans and procedures related to organizational security.
- Summarize business impact analysis concepts.
- Explain risk management processes and concepts.
- Given a scenario, follow incident response procedures.
- Summarize basic concepts of forensics.
- Explain disaster recovery and continuity of operation concepts.
- Compare and contrast various types of controls.
- Given a scenario, carry out data security and privacy practices.
- Cryptography and PKI
- Compare and contrast basic concepts of cryptography.
- Explain cryptography algorithms and their basic characteristics.
- Given a scenario, install and configure wireless security settings.
- Given a scenario, implement public key infrastructure.