Exam Objective:

Section 01: Threats, Attacks and Vulnerabilities

Section 02: Technologies and Tools

Section 03: Architecture and Design

Section 04: Identity and Access Management

Section 05: Risk Management

Section 06: Cryptography and PKI

Detailed Syllabus:

Section 01: Threats, Attacks and Vulnerabilities

Given a scenario, analyze indicators of compromise and determine the type of malware
Compare and contrast types of attacks
Explain threat actor types and attributes
Explain penetration testing concepts
Explain vulnerability scanning concepts
Explain the impact associated with types of vulnerabilities

Section 02: Technologies and Tools

Install and configure network components, both hardware and software-based, to support organizational security
Given a scenario, use appropriate software tools to assess the security posture of an organization
Given a scenario, troubleshoot common security issues
Given a scenario, analyze and interpret output from security technologies
Given a scenario, deploy mobile devices securely
Given a scenario, implement secure protocols

Section 03: Architecture and Design

Explain use cases and purpose for frameworks, best practices and secure configuration guides
Given a scenario, implement secure network architecture concepts
Given a scenario, implement secure systems design
Explain the importance of secure staging deployment concepts
Explain the security implications of embedded systems
Summarize secure application development and deployment concepts
Summarize cloud and virtualization concepts
Explain how resiliency and automation strategies reduce risk
Explain the importance of physical security controls

Section 04: Identity and Access Management

Compare and contrast identity and access management concepts
Given a scenario, install and configure identity and access services
Given a scenario, implement identity and access management controls
Given a scenario, different common account management practices

Section 05: Risk Management

Explain the importance of policies, plans and procedures related to organizational security
Summarize business impact analysis concepts
Explain risk management processes and concepts
Given a scenario, follow incident response procedures
Summarize basic concepts of forensics
Explain disaster recovery and continuity of operation concepts
Compare and contrast various types of controls
Given a scenario, carry out data security and privacy practices

Section 06: Cryptography and PKI

Compare and contrast basic concepts of cryptography
Explain cryptography algorithms and their basic characteristics
Given a scenario, install and configure wireless security settings
Given a scenario, implement public key infrastructure

If You Like What We Do Here On PentesterWorld, You Should Consider:

Stay Connected to: Twitter | Facebook

Subscribe to our email updates: Sign Up Now

 

We are thankful for your support.