Exam Objective:
Section 01: Threats, Attacks and Vulnerabilities
Section 02: Technologies and Tools
Section 03: Architecture and Design
Section 04: Identity and Access Management
Section 05: Risk Management
Section 06: Cryptography and PKI
Detailed Syllabus:
Section 01: Threats, Attacks and Vulnerabilities
Given a scenario, analyze indicators of compromise and determine the type of malware
Compare and contrast types of attacks
Explain threat actor types and attributes
Explain penetration testing concepts
Explain vulnerability scanning concepts
Explain the impact associated with types of vulnerabilities
Section 02: Technologies and Tools
Install and configure network components, both hardware and software-based, to support organizational security
Given a scenario, use appropriate software tools to assess the security posture of an organization
Given a scenario, troubleshoot common security issues
Given a scenario, analyze and interpret output from security technologies
Given a scenario, deploy mobile devices securely
Given a scenario, implement secure protocols
Section 03: Architecture and Design
Explain use cases and purpose for frameworks, best practices and secure configuration guides
Given a scenario, implement secure network architecture concepts
Given a scenario, implement secure systems design
Explain the importance of secure staging deployment concepts
Explain the security implications of embedded systems
Summarize secure application development and deployment concepts
Summarize cloud and virtualization concepts
Explain how resiliency and automation strategies reduce risk
Explain the importance of physical security controls
Section 04: Identity and Access Management
Compare and contrast identity and access management concepts
Given a scenario, install and configure identity and access services
Given a scenario, implement identity and access management controls
Given a scenario, different common account management practices
Section 05: Risk Management
Explain the importance of policies, plans and procedures related to organizational security
Summarize business impact analysis concepts
Explain risk management processes and concepts
Given a scenario, follow incident response procedures
Summarize basic concepts of forensics
Explain disaster recovery and continuity of operation concepts
Compare and contrast various types of controls
Given a scenario, carry out data security and privacy practices
Section 06: Cryptography and PKI
Compare and contrast basic concepts of cryptography
Explain cryptography algorithms and their basic characteristics
Given a scenario, install and configure wireless security settings
Given a scenario, implement public key infrastructure
If You Like What We Do Here On PentesterWorld, You Should Consider:
Stay Connected to: Twitter | Facebook
Subscribe to our email updates: Sign Up Now
We are thankful for your support.
Recent Comments