Exam Objective:

Session 01: Risk Management

Session 02: Enterprise Security Architecture

Session 03: Enterprise Security Operations

Session 04: Technical Integration of Enterprise Security

Session 05: Research, Development and Collaboration

Detailed Syllabus:

Session 01: Risk Management

Summarize business and industry influences and associated security risks
Compare and contrast security, privacy policies and procedures based on organizational requirements
Given a scenario, execute risk mitigation strategies and controls
Analyze risk metric scenarios to secure the enterprise

Session 02: Enterprise Security Architecture

Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements
Analyze a scenario to integrate security controls for host devices to meet security requirements
Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements
Given software vulnerability scenarios, select appropriate security controls

Session 03: Enterprise Security Operations

Given a scenario, conduct a security assessment using the appropriate methods
Analyze a scenario or output, and select the appropriate tool for a security assessment
Given a scenario, implement incident response and recovery procedures

Session 04: Technical Integration of Enterprise Security

Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture
Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture
Given a scenario, integrate and troubleshooting advanced authentication and authorization and authorization technologies to support enterprise security objectives
Given a scenario, implement cryptographic techniques
Given a scenario, select the appropriate control to secure communications and collaboration solutions

Session 05: Research, Development and Collaboration

Given a scenario, apply research methods to determine industry trends and their impact to the enterprise
Given a scenario, implement security activities across the technology life cycle
Explain the importance of interaction across diverse business units to achieve security goals

If You Like What We Do Here On PentesterWorld, You Should Consider:

Stay Connected to: Twitter | Facebook

Subscribe to our email updates: Sign Up Now

 

We are thankful for your support.