Welcome to the Course
Part 1 - Summarize Fundamental Security Concepts
Part 2 - Compare Threat Types
Part 3 - Explain Cryptographic Solutions
Part 4 - Implement Identity and Access Management
Part 5 - Secure Enterprise Network Architecture
Part 6 - Secure Cloud Network Architecture
Part 7 - Explain Resiliency and Site Security Concepts
Part 8 - Explain Vulnerability Management
Part 9 - Evaluate Network Security Capabilities
Part 10 - Assess Endpoint Security Capabilities
Part 11 - Enhance Application Security Capabilities
Part 12 - Explain Incident Response and Monitoring Concepts
Part 13 - Analyze Indicators of Malicious Activity
Part 14 - Summarize Security Governance Concepts
Part 15 - Explain Risk Management
Part 16 - Summarize Data Protection and Compliance Concepts
Conclusion