{"title":"Cybersecurity and Compliance","description":"","products":[{"product_id":"sc-200t00-microsoft-security-operations-analyst","title":"SC-200T00: Defend Against Cyberthreats with Microsoft's Security Operations Platform Lab w\/ CEP","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/p\u003e\n\u003cp\u003eLearn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this official Microsoft hands-on lab, you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The lab was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. \u003c\/p\u003e\n\u003cp\u003eThis product includes a Cloud Express Pass (CEP) with your lab purchase if you purchase the CEP option. The CEP can be found under the \"\"Info\"\" tab after launching your lab.\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003cbr\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":42957878329475,"sku":"","price":34.49,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/page-19.png?v=1681838344"},{"product_id":"sc-300t00-microsoft-identity-and-access-administrator","title":"SC-300T00: Microsoft Identity and Access Administrator Lab","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment. Th\u003cspan\u003ee \u003c\/span\u003e\u003cspan\u003elab requires an Azure Pass. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eThe Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications in this official Microsoft hands-on lab. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003eThis product includes a Cloud Express Pass (CEP) with your lab purchase if you purchase the CEP option. The CEP can be found under the \"\"Info\"\" tab after launching your lab.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003cbr\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Cloud Express Pass","offer_id":42957879443587,"sku":"","price":34.6,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-20_77d2a64f-eaab-472d-add8-ec128f38c495.png?v=1716842652"},{"product_id":"sc-900t00-microsoft-security-compliance-and-identity-fundamentals","title":"SC-900T00: Introduction to Microsoft Security, Compliance, and Identity Lab","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/p\u003e\n\u003cp\u003eThis official Microsoft hands-on lab provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eThis product includes a Cloud Express Pass (CEP) with your lab purchase. The CEP can be found under the \"Info\" tab after launching your lab.\u003c\/p\u003e\n\u003cp\u003eLabs are available in English.\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Add Cloud Express Pass","offer_id":43261640540291,"sku":"","price":14.5,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/page-18_5e432bba-27ae-480c-acc6-13c092600c63.png?v=1681838456"},{"product_id":"comptia-security","title":"CompTIA Security+ Lab","description":"\u003cp\u003eThis CompTIA Security+ lab provides a hands-on approach to understanding fundamental security concepts, identifying potential threats and vulnerabilities, implementing security controls, and managing risks in enterprise environments. Through practical exercises, learners will develop skills in areas such as enforcing security policies, securing third-party interactions, achieving security compliance, analyzing malicious activity, and enhancing enterprise security. The lab also covers essential topics like cryptography, network security, identity and access management, and the importance of resilience and automation in security operations. Upon completion, students will be equipped with practical skills necessary for security professionals to protect organizational assets and respond to security incidents. This lab prepares students for exam SY0-701.\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003e\u003cspan data-teams=\"true\"\u003eThis lab is based on the Ascend Education CompTIA content. \u003c\/span\u003e\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":43162801012867,"sku":"","price":53.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/CompTIA_c6ce6041-3b5f-484d-8bf4-c7025b5d85fa.png?v=1677519581"},{"product_id":"comptia-a","title":"CompTIA A+ Lab (1201)","description":"\u003cp\u003eThis course provides comprehensive training for IT professionals in fundamental hardware, software, networking, and troubleshooting skills across various computing environments. It covers essential mobile device components and connectivity, wired and wireless network configurations, mobile device management, cloud services, and hands on diagnostic techniques for a range of PC and network issues. Through practical and theoretical exercises, participants develop the ability to install, configure, manage, and troubleshoot systems and networks effectively in real-world IT environments. \u003cspan\u003eThis lab prepares students for exam 220-1201.\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"product-info-detailed\"\u003e\n\u003cdiv class=\"tab-content\"\u003e\n\u003cdiv role=\"tabpanel\" class=\"tab-pane active\" id=\"description\"\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003e\u003cspan data-teams=\"true\"\u003eThis lab is based on the Ascend Education CompTIA content. \u003c\/span\u003e\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":43162800095363,"sku":"","price":53.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/CompTIA.png?v=1677519550"},{"product_id":"copy-of-sc-200t00-microsoft-security-operations-analyst-lab","title":"SC-100T00: Microsoft Cybersecurity Architect Lab","description":"\u003cp\u003eWhile there is no official Microsoft lab for SC-100, XtremeLabs has created their own. This lab prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003cbr\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":43206221791363,"sku":"","price":23.7,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-18.png?v=1729793963"},{"product_id":"sc-900-microsoft-security-compliance-and-identity-fundamentals-self-paced-training","title":"SC-900: Microsoft Security, Compliance, and Identity Fundamentals Self-Paced Training","description":"\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003cp\u003e\u003cspan data-mce-fragment=\"1\"\u003eThis course provides foundation-level knowledge of security, compliance, and identity concepts and related cloud-based Microsoft solutions.\u003c\/span\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003ch3\u003eAudience Profile\u003c\/h3\u003e\n\u003cp\u003e\u003cspan _msthash=\"111\" _msttexthash=\"96798\"\u003eThe audience for this course is looking to become familiar with the basics of security, compliance, and identity (SCI) in cloud-based environments and related Microsoft services. The content of this course aligns with the mastery of the SC-900 exam objective. This certification is for those looking to become familiar with security, compliance, and identity (SCI) fundamentals across cloud-based and related Microsoft services.\u003c\/span\u003e\u003c\/p\u003e\n\u003ch3\u003e\u003cspan _msthash=\"111\" _msttexthash=\"96798\"\u003eItems in this Collection\u003c\/span\u003e\u003c\/h3\u003e\n\u003cul\u003e\n\u003cli _mstvisible=\"3\" _msthash=\"265\" _msttexthash=\"2065661\"\u003eDescription of security and compliance concepts (8 Units)\u003c\/li\u003e\n\u003cli _mstvisible=\"3\" _msthash=\"266\" _msttexthash=\"1203046\"\u003eDescription of identity concepts\u003cspan data-mce-fragment=\"1\"\u003e (8 Units)\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli _mstvisible=\"3\" _msthash=\"267\" _msttexthash=\"2208713\"\u003eUnderstanding Azure AD identity types and services\u003cspan data-mce-fragment=\"1\"\u003e (8 Units)\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli _mstvisible=\"3\" _msthash=\"268\" _msttexthash=\"2024152\"\u003eDescribes Azure AD authentication capabilities\u003cspan _istranslated=\"1\" data-mce-fragment=\"1\"\u003e\u003cspan\u003e \u003c\/span\u003e(7 Units)\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"269\" _msttexthash=\"2451605\" data-mce-fragment=\"1\"\u003eDescribe the access management capabilities of Azure AD (5 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"270\" _msttexthash=\"3926858\" data-mce-fragment=\"1\"\u003eDescription of Azure AD identity protection and governance capabilities (7 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"271\" _msttexthash=\"2026609\" data-mce-fragment=\"1\"\u003eDescription of basic security features in Azure (10 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"272\" _msttexthash=\"2532998\" data-mce-fragment=\"1\"\u003eDescription of Azure security management capabilities (7 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"273\" _msttexthash=\"2540876\" data-mce-fragment=\"1\"\u003eDescription of security features of Microsoft Sentinel (6 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"274\" _msttexthash=\"2832531\" data-mce-fragment=\"1\"\u003eUnderstanding Threat Protection with Microsoft 365 Defender (9 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"275\" _msttexthash=\"2605174\" data-mce-fragment=\"1\"\u003eMicrosoft Privacy and Services Trust Portal Description (6 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"276\" _msttexthash=\"4215692\" data-mce-fragment=\"1\"\u003eUnderstanding the Compliance Management Capabilities in Microsoft Purview (6 Units) \u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"277\" _msttexthash=\"5591716\" data-mce-fragment=\"1\"\u003eUnderstanding Information Protection and Data Lifecycle Management in Microsoft Purview (9 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"278\" _msttexthash=\"3128021\" data-mce-fragment=\"1\"\u003eUnderstanding Internal Risk Capabilities at Microsoft Purview (6 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"279\" _msttexthash=\"4047823\" data-mce-fragment=\"1\"\u003eDescription of eDiscovery and auditing capabilities of Microsoft Purview (5 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\u003cspan _mstvisible=\"4\" _msthash=\"280\" _msttexthash=\"2695043\" data-mce-fragment=\"1\"\u003eDescription of resource governance capabilities in Azure (6 Units)\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003ch3\u003e\u003cbr\u003e\u003c\/h3\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003ch3\u003ePrevious Requirements\u003c\/h3\u003e\n\u003cp _mstvisible=\"2\" _msthash=\"282\" _msttexthash=\"1648387\"\u003eBefore attending this course, students must have:\u003c\/p\u003e\n\u003cul _mstvisible=\"2\"\u003e\n\u003cli _mstvisible=\"3\"\u003e\n\u003cp _mstvisible=\"4\" _msthash=\"283\" _msttexthash=\"1865929\"\u003eOverview of cloud computing and networking concepts.\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\n\u003cp _mstvisible=\"4\" _msthash=\"284\" _msttexthash=\"3328676\"\u003eGeneral knowledge of IT or general experience working in an IT environment.\u003c\/p\u003e\n\u003c\/li\u003e\n\u003cli _mstvisible=\"3\"\u003e\n\u003cp _mstvisible=\"4\" _msthash=\"285\" _msttexthash=\"1329471\"\u003eOverview of Microsoft Azure and Microsoft 365.\u003c\/p\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eCourse is available in both English and Spanish. \u003c\/p\u003e\n\u003cp\u003eLabs are available in Spanish. \u003c\/p\u003e\n\u003cp _msthash=\"115\" _msttexthash=\"976778439\"\u003eStudent Access: 60 Days\u003c\/p\u003e","brand":"Nanfor Iberica","offers":[{"title":"Default Title","offer_id":43301735235715,"sku":null,"price":324.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/MicrosoftTraining_8269425a-bd6d-47da-af1f-00860fafa1af.png?v=1694577921"},{"product_id":"mce-microsoft-certified-expert-cybersecurity-architect-study-guide-exam-sc-100","title":"MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100","description":"\u003cp\u003e\u003cb\u003e\u003cspan style=\"font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: #1f2124;\"\u003eThis is an ebook. \u003c\/span\u003e\u003c\/b\u003e\u003cspan style=\"font-size: 10.5pt; font-family: 'Segoe UI',sans-serif; color: #1f2124;\"\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cb\u003ePrep for the SC-100 exam like a pro with Sybex’ latest Study Guide\u003c\/b\u003e\u003c\/p\u003e\n\u003cp\u003eIn the\u003cspan\u003e \u003c\/span\u003e\u003ci\u003eMCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100\u003c\/i\u003e, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect certification exam offered by Microsoft. In the book, you’ll find comprehensive coverage of the objectives tested by the exam, covering the evaluation of Governance Risk Compliance technical and security operations strategies, the design of Zero Trust strategies and architectures, and data and application strategy design.\u003c\/p\u003e\n\u003cp\u003eWith the information provided by the authors, you’ll be prepared for your first day in a new role as a cybersecurity architect, gaining practical, hands-on skills with modern Azure deployments. You’ll also find:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eIn-depth discussions of every single objective covered by the SC-100 exam and, by extension, the skills necessary to succeed as a Microsoft cybersecurity architect\u003c\/li\u003e\n\u003cli\u003eCritical information to help you obtain a widely sought-after credential that is increasingly popular across the industry (especially in government roles)\u003c\/li\u003e\n\u003cli\u003eValuable online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary of crucial technical terms\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eAn essential roadmap to the SC-100 exam and a new career in cybersecurity architecture on the Microsoft Azure cloud platform,\u003cspan\u003e \u003c\/span\u003e\u003ci\u003eMCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100\u003c\/i\u003e\u003cspan\u003e \u003c\/span\u003eis also ideal for anyone seeking to improve their knowledge and understanding of cloud-based management and security.\u003c\/p\u003e\n\u003cdiv class=\"description\" data-mce-fragment=\"1\"\u003e\u003c\/div\u003e","brand":"Wiley\/Sybex","offers":[{"title":"Default Title","offer_id":43525024383107,"sku":null,"price":50.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/SC-100.png?v=1703726249"},{"product_id":"cybersecurity-coaching-program","title":"Cybersecurity Coaching Program","description":"\u003cp\u003eWelcome to the Cybersecurity Professional program, thoughtfully designed to give you the knowledge and skills you need to succeed in the field of cybersecurity. This program is tailored for IT professionals who want to switch to cybersecurity roles and become highly skilled.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003ePrepares for Real IT Roles:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eCybersecurity roles\u003c\/li\u003e\n\u003cli\u003eIT Security Administrator Roles\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003ePrepares for Certifications:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eCompTIA Security+ SY0-701 Prep\u003c\/li\u003e\n\u003cli\u003eTestOut Security Pro\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWhy Choose Our Online Program?\u003c\/strong\u003e\u003c\/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cstrong\u003eComprehensive Curriculum\u003c\/strong\u003e: Our comprehensive curriculum ensures that you develop a well-rounded skill set and the expertise needed to tackle the complex challenges of cybersecurity effectively. With a focus on practical application and real-world scenarios, you'll be equipped to protect digital assets, mitigate risks, and safeguard organizations against cyber threats in an ever-evolving landscape.\u003c\/li\u003e\n\u003cli\u003e\n\u003cstrong\u003eExpert Guidance\u003c\/strong\u003e: Learn from industry experts who possess extensive knowledge and practical experience in the field. They will guide you through the courses in your discord server, providing valuable insights and support along the way.\u003c\/li\u003e\n\u003cli\u003e\n\u003cstrong\u003eHands-on Training\u003c\/strong\u003e: Our hands-on approach to the training sessions allows you to apply your skills in practical scenarios and real-world projects, ensuring effective learning.\u003c\/li\u003e\n\u003cli\u003e\n\u003cstrong\u003eOngoing Support\u003c\/strong\u003e: We understand the importance of continuous learning and growth. Our partnership ensures that you receive ongoing support and guidance even after the sessions, helping you advance in your career.\u003c\/li\u003e\n\u003c\/ol\u003e\n\u003cp\u003e\u003cstrong\u003eWhat is Included:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eOfficial CompTIA Security+ Courseware | Three months Access\u003c\/li\u003e\n\u003cli\u003eJobskillsare Premium membership | 1 Year access\u003c\/li\u003e\n\u003cli\u003eThree IT Engineer's Discord Mentorship - If you need help with CompTIA Labs, Concept, or other materials.\u003c\/li\u003e\n\u003cli\u003eGuided access and tasks provided by the program Administrator\u003c\/li\u003e\n\u003cli\u003eTrainee Internship\u003c\/li\u003e\n\u003cli\u003eJob References\u003c\/li\u003e\n\u003cli\u003eResume Help\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"Jobskillshare","offers":[{"title":"Default Title","offer_id":43729715101827,"sku":null,"price":1950.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/CybersecurityCoaching.png?v=1709583894"},{"product_id":"sc-5001-configure-siem-security-operations-using-microsoft-sentinel-lab","title":"SC-5001: Configure SIEM security operations using Microsoft Sentinel Lab","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/p\u003e\n\u003cp\u003eIn this lab, students will get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003cbr\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Add Cloud Express Pass","offer_id":43761498783875,"sku":null,"price":25.5,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-19_e717bfd7-8155-416d-b345-021f70ed3ade.png?v=1710194139"},{"product_id":"computer-hacking-forensic-investigator-chfi-ilearn","title":"EC-Council Computer Hacking Forensic Investigator (CHFI) iLearn","description":"\u003cp data-mce-fragment=\"1\"\u003eThis solution is an asynchronous, self-study environment in a video streaming format.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003ca href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\"\u003eEC-Council’s C|HFI program\u003c\/a\u003e prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate\/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eThis intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eStudents learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eThe program provides credible professional knowledge with globally recognized certification required for a successful digital forensics and DFIR career, thus increasing your employability.\u003c\/p\u003e\n\u003ch4 data-mce-fragment=\"1\"\u003eStudents will Learn\u003c\/h4\u003e\n\u003col data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eComputer forensics fundamentals, different types of cybercrimes and their investigation procedures, and regulations and standards that influence computer forensics investigation\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eVarious phases involved in the computer forensics investigation process\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDifferent types of disk drives and their characteristics, booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS\/SAN storage systems, various encoding standards, and file format analysis\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eData acquisition fundamentals and methodology, eDiscovery, and how to prepare image files for forensics examination\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eVarious anti-forensics techniques used by attackers, different ways to detect them and related tools, and countermeasures\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eVolatile and non-volatile data acquisition in Windows-based operating systems, Windows memory and registry analysis, electron application analysis, Web browser forensics, and examination of Windows files, ShellBags, LNK files, and Jump Lists, and Windows event logs\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eVolatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eNetwork forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs)and ways to identify them from network logs, techniques and tools related to network traffic investigation, incident detection and examination, and wireless attack detection and investigation\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMalware forensics concepts, static and dynamic malware analysis, system and network behavior analysis, and ransomware analysis\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eWeb application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), and how to detect and investigate various web application attacks\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTor browser working methodology and steps involved in the Tor browser forensics process\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCloud computing concepts, cloud forensics, and challenges, fundamentals of AWS, Microsoft Azure, and Google Cloud and their investigation processes\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eComponents in email communication, steps involved in email crime investigation, and social media forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eArchitectural layers and boot processes of Android and iOS devices, mobile forensics process, various cellular networks, SIM file system, and logical and physical acquisition of Android and iOS devices\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDifferent types of IoT threats, security problems, vulnerabilities and attack surfaces areas, and IoT forensics process and challenges\u003c\/li\u003e\n\u003c\/ol\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse Outline \u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eComputer Forensics in Today's World\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eComputer Forensics Investigation Process\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eUnderstanding Hard Disks and File Systems\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eData Acquisition and Duplication\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDefeating Anti-forensics Techniques\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eWindows Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eLinux and Mac Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eNetwork Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMalware Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInvestigating Web Attacks\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDark Web Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCloud Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEmail and Social Media Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMobile Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIoT Forensics\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003ch4 data-mce-fragment=\"1\"\u003eRecommended Prerequisites\u003c\/h4\u003e\n\u003cp data-mce-fragment=\"1\"\u003eIT\/forensics professionals with basic knowledge of IT\/cybersecurity, computer forensics, incident response, and threat vectors.\u003c\/p\u003e","brand":"EC-Council","offers":[{"title":"Default Title","offer_id":43796672053379,"sku":"","price":2199.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/ECCouncil.png?v=1710820578"},{"product_id":"certified-penetration-testing-professional-ilearn","title":"EC-Council Certified Penetration Testing Professional (CPENT) iLearn","description":"\u003cp data-mce-fragment=\"1\"\u003eThis solution is an asynchronous, self-study environment in a video streaming format.\u003c\/p\u003e\n\u003cp\u003eA rigorous Penetration Testing program that, unlike contemporary Penetration Testing courses, teaches you how to perform an effective Penetration test across filtered networks. C|PENT is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. In summary, there is no program of its kind in the world.\u003c\/p\u003e\n\u003cp\u003eYears of research indicate that the majority of Penetration Testing professionals have gaps in their skills when it comes to multiple disciplines. The metrics also prove that when the targets are not located on the same or a directly connected and reach able segment, very few can perform as well as they do when it is direct and on a flat network.\u003c\/p\u003e\n\u003cp\u003eThat’s why for the first time in the industry, the assessment for the Certified Penetration Testing Professional (C|PENT) is about multiple disciplines and not just one or two specialty types.\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe course is presented through an enterprise network environment that must be attacked, exploited, evaded, and defended.\u003c\/li\u003e\n\u003cli\u003eEC-Council’s C|PENT assesses a Penetration Tester’s skills across a broad spectrum of “network zones”.\u003c\/li\u003e\n\u003cli\u003eWhat makes the C|PENT different is the requirement to be provided a variety of different scopes of work so that the candidate can “think on their feet.”\u003c\/li\u003e\n\u003cli\u003eThe result of this is that there are different zones representing different types of testing.\u003c\/li\u003e\n\u003cli\u003eAnyone attempting the test will have to perform their assessment against these different zones.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eTarget Audience\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eEthical Hackers\u003c\/li\u003e\n\u003cli\u003ePenetration Testers\u003c\/li\u003e\n\u003cli\u003eNetwork Server Administrators\u003c\/li\u003e\n\u003cli\u003eFirewall Administrators\u003c\/li\u003e\n\u003cli\u003eSecurity Testers\u003c\/li\u003e\n\u003cli\u003eSystem Administrators and Risk Assessment Professionals\u003c\/li\u003e\n\u003cli\u003eCybersecurity Forensic Analyst\u003c\/li\u003e\n\u003cli\u003eCyberthreat Analyst\u003c\/li\u003e\n\u003cli\u003eCloud Security\u003c\/li\u003e\n\u003cli\u003eAnalyst Information Security Consultant\u003c\/li\u003e\n\u003cli\u003eApplication Security Analyst\u003c\/li\u003e\n\u003cli\u003eCybersecurity Assurance Engineer\u003c\/li\u003e\n\u003cli\u003eSecurity Operations Center (SOC)Analyst\u003c\/li\u003e\n\u003cli\u003eTechnical Operations Network Engineer\u003c\/li\u003e\n\u003cli\u003eInformation Security Engineer\u003c\/li\u003e\n\u003cli\u003eNetwork Security Penetration Tester\u003c\/li\u003e\n\u003cli\u003eNetwork Security Engineer\u003c\/li\u003e\n\u003cli\u003eInformation Security Architect\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eMODULE 01: Introduction to Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 02: Penetration Testing Scoping and Engagement\u003c\/p\u003e\n\u003cp\u003eMODULE 03: Open Source Intelligence (OSINT)\u003c\/p\u003e\n\u003cp\u003eMODULE 04: Social Engineering Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 05: Network Penetration Testing – External\u003c\/p\u003e\n\u003cp\u003eMODULE 06: Network Penetration Testing – Internal\u003c\/p\u003e\n\u003cp\u003eMODULE 07: Network Penetration Testing - Perimeter Devices\u003c\/p\u003e\n\u003cp\u003eMODULE 08: Web Application Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 09: Wireless Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 10: IoT Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 11: OT\/SCADA Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 12: Cloud Penetration Testing\u003c\/p\u003e\n\u003cp\u003eMODULE 13: Binary Analysis and Exploitation\u003c\/p\u003e\n\u003cp\u003eMODULE 14: Report Writing and Post Testing Actions\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eAdditional Self-Study Modules\u003c\/strong\u003e\u003c\/p\u003e\n\u003col\u003e\n\u003cli\u003ePenetration Testing Essential Concepts\u003c\/li\u003e\n\u003cli\u003eFuzzing\u003c\/li\u003e\n\u003cli\u003eMastering Metasploit Framework\u003c\/li\u003e\n\u003cli\u003ePowerShell Scripting\u003c\/li\u003e\n\u003cli\u003eBash Environment and Scripting\u003c\/li\u003e\n\u003cli\u003ePython Environment and Scripting\u003c\/li\u003e\n\u003cli\u003ePerl Environment and Scripting\u003c\/li\u003e\n\u003cli\u003eRuby Environment and Scripting\u003c\/li\u003e\n\u003cli\u003eActive Directory Penetration Testing\u003c\/li\u003e\n\u003cli\u003eDatabase Penetration Testing\u003c\/li\u003e\n\u003cli\u003eMobile Device Penetration Testing\u003c\/li\u003e\n\u003c\/ol\u003e","brand":"EC-Council","offers":[{"title":"Default Title","offer_id":43800416747651,"sku":null,"price":2199.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/ECCouncil_518311f7-b363-4898-a82e-10c816f50454.png?v=1710872670"},{"product_id":"secure-azure-services-and-workloads-with-microsoft-defender-for-cloud-regulatory-compliance-controls-lab","title":"SC-5002: Secure Azure Services and Workloads with Microsoft Defender for Cloud Regulatory Compliance Controls Lab","description":"\u003cp\u003e\u003cspan data-mce-fragment=\"1\"\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eThis lab guides students in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.\u003c\/p\u003e\n\u003cp\u003e\u003cspan data-mce-fragment=\"1\"\u003eThis product includes an optional Cloud Express Pass (CEP) to bundle with your lab purchase. The CEP can be found under the \"Info\" tab after launching your lab. The custom tenant reduces instructor setup time and provides cloud resources for learners.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan data-mce-fragment=\"1\"\u003eLabs are available in English.\u003c\/span\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Add Cloud Express Pass","offer_id":43800675025027,"sku":null,"price":25.5,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-20_3934b942-2ca9-4745-bb7a-2fa733496509.png?v=1710876784"},{"product_id":"ec-council-certified-encryption-specialist-eces-ilearn","title":"EC-Council Certified Encryption Specialist (ECES) iLearn","description":"\u003cp\u003eThis solution is an asynchronous, self-study environment in a video streaming format.\u003c\/p\u003e\n\u003cp\u003eThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES, and AES. ECES provides necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course covering various algorithms, the key concepts behind those algorithms, applications of the cryptography in various ways and performing cryptanalysis.\u003c\/p\u003e\n\u003cp\u003eThe student will\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDevelop skills to protect critical data in organizations with encryption\u003c\/li\u003e\n\u003cli\u003eDevelop a deep understanding of essential cryptography algorithms and their applications\u003c\/li\u003e\n\u003cli\u003eMake informed decisions about applying encryption technologies\u003c\/li\u003e\n\u003cli\u003eSave time and cost by avoiding common mistakes in implementing encryption technologies effectively\u003c\/li\u003e\n\u003cli\u003eDevelop working knowledge of cryptanalysis\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eTarget Audience\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003ePenetration Testers and Computer Forensics Specialists\u003c\/li\u003e\n\u003cli\u003eCloud Security architects, designers, and developers\u003c\/li\u003e\n\u003cli\u003eAnyone involved in selecting and implementing VPNs or digital certificates, Information Security Operations\u003c\/li\u003e\n\u003cli\u003eAnyone involved in developing Operating Systems, Cryptography Systems, Blockchain based solutions, etc.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWhat Will You Learn\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eTypes of encryption standards and their differences\u003c\/li\u003e\n\u003cli\u003eHow to select the best standard for your organization?\u003c\/li\u003e\n\u003cli\u003eHow to enhance your pen-testing knowledge in encryption?\u003c\/li\u003e\n\u003cli\u003eCorrect and incorrect deployment of encryption technologies\u003c\/li\u003e\n\u003cli\u003eCommon mistakes made in implementing encryption technologies\u003c\/li\u003e\n\u003cli\u003eBest practices when implementing encryption technologies\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003ePrerequisites\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eNo prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eModule 01: Introduction and History of Cryptography\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eWhat is Cryptography?\u003c\/li\u003e\n\u003cli\u003eHistory of Cryptography\u003c\/li\u003e\n\u003cli\u003eMono-Alphabet Substitution (Caesar Cipher, Atbash Cipher, Affine Cipher, ROT13 Cipher)\u003c\/li\u003e\n\u003cli\u003eMulti-Alphabet Substitution (Cipher Disk, Vigenère Cipher, Playfair Cipher, ADFGVX Cipher)\u003c\/li\u003e\n\u003cli\u003eHomophonic Substitution\u003c\/li\u003e\n\u003cli\u003eNull and Book Ciphers\u003c\/li\u003e\n\u003cli\u003eRail Fence Ciphers\u003c\/li\u003e\n\u003cli\u003eThe Enigma Machine\u003c\/li\u003e\n\u003cli\u003eCrypTool\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eModule 02: Symmetric Cryptography and Hashes\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eSymmetric Cryptography\u003c\/li\u003e\n\u003cli\u003eInformation Theory\u003c\/li\u003e\n\u003cli\u003eKerckhoffs’s Principle\u003c\/li\u003e\n\u003cli\u003eSubstitution and Transposition\u003c\/li\u003e\n\u003cli\u003eBinary Math\u003c\/li\u003e\n\u003cli\u003eBlock Cipher vs. Stream Cipher\u003c\/li\u003e\n\u003cli\u003eSymmetric Block Cipher Algorithms (Feistel Function, DES, 3DES, AES, Blowfish, Serpent, Twofish, Skipjack, IDEA, CAST, TEA, SHARK)\u003c\/li\u003e\n\u003cli\u003eSymmetric Algorithm Methods\u003c\/li\u003e\n\u003cli\u003eSymmetric Stream Ciphers (RC4, FISH, PIKE)\u003c\/li\u003e\n\u003cli\u003eHash Function (Hash – Salt, MD5, MD6, SHA,FORK-256, RIPEMD-160, GOST, Tiger)\u003c\/li\u003e\n\u003cli\u003eCryptoBench\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eModule 03: Number Theory and Asymmetric Cryptography\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eAsymmetric Encryption\u003c\/li\u003e\n\u003cli\u003eBasic Number Facts\u003c\/li\u003e\n\u003cli\u003eBirthday Theorem\u003c\/li\u003e\n\u003cli\u003eRandom Number Generator\u003c\/li\u003e\n\u003cli\u003eDiffie-Hellman\u003c\/li\u003e\n\u003cli\u003eRivest Shamir Adleman (RSA)\u003c\/li\u003e\n\u003cli\u003eMenezes–Qu–Vanstone\u003c\/li\u003e\n\u003cli\u003eDigital Signature Algorithm\u003c\/li\u003e\n\u003cli\u003eElliptic Curve\u003c\/li\u003e\n\u003cli\u003eElgamal\u003c\/li\u003e\n\u003cli\u003eCrypTool\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eModule 04: Applications of Cryptography\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eFIPS Standards\u003c\/li\u003e\n\u003cli\u003eDigital Signatures\u003c\/li\u003e\n\u003cli\u003eDigital Certificate\u003c\/li\u003e\n\u003cli\u003ePublic Key Infrastructure (PKI)\u003c\/li\u003e\n\u003cli\u003eDigital Certificate Management\u003c\/li\u003e\n\u003cli\u003eTrust Models\u003c\/li\u003e\n\u003cli\u003eCertificates and Web Servers\u003c\/li\u003e\n\u003cli\u003eAuthentication (PAP, S-PAP, CHAP, Kerberos)\u003c\/li\u003e\n\u003cli\u003ePretty Good Privacy (PGP)\u003c\/li\u003e\n\u003cli\u003eWi-Fi Encryption\u003c\/li\u003e\n\u003cli\u003eSSL and TLS\u003c\/li\u003e\n\u003cli\u003eVirtual Private Network (VPN)\u003c\/li\u003e\n\u003cli\u003eEncrypting Files\u003c\/li\u003e\n\u003cli\u003eBitLocker\u003c\/li\u003e\n\u003cli\u003eDisk Encryption Software: VeraCrypt\u003c\/li\u003e\n\u003cli\u003eCommon Cryptography Mistakes\u003c\/li\u003e\n\u003cli\u003eSteganography\u003c\/li\u003e\n\u003cli\u003eSteganalysis\u003c\/li\u003e\n\u003cli\u003eSteganography Detection Tools\u003c\/li\u003e\n\u003cli\u003eNational Security Agency and Cryptography\u003c\/li\u003e\n\u003cli\u003eUnbreakable Encryption\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eModule 05: Cryptanalysis\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eBreaking Ciphers\u003c\/li\u003e\n\u003cli\u003eCryptanalysis\u003c\/li\u003e\n\u003cli\u003eFrequency Analysis\u003c\/li\u003e\n\u003cli\u003eKasiski\u003c\/li\u003e\n\u003cli\u003eCracking Modern Cryptography\u003c\/li\u003e\n\u003cli\u003eLinear Cryptanalysis\u003c\/li\u003e\n\u003cli\u003eDifferential Cryptanalysis\u003c\/li\u003e\n\u003cli\u003eIntegral Cryptanalysis\u003c\/li\u003e\n\u003cli\u003eCryptanalysis Resources\u003c\/li\u003e\n\u003cli\u003eCryptanalysis Success\u003c\/li\u003e\n\u003cli\u003eRainbow Tables\u003c\/li\u003e\n\u003cli\u003ePassword Cracking\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003col\u003e\u003c\/ol\u003e","brand":"EC-Council","offers":[{"title":"Default Title","offer_id":43964858663043,"sku":null,"price":1399.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/ECCouncil_8e1a3a6c-9f20-4573-aefa-cfae7526bb61.png?v=1712632212"},{"product_id":"ec-council-certified-network-defender-ilearn","title":"EC-Council Certified Network Defender (CND) iLearn","description":"\u003cp\u003eThis solution is an asynchronous, self-study environment in a video streaming format.\u003c\/p\u003e\n\u003cp\u003eNetwork security skills are in high demand among organizations as well as cybersecurity aspirants.\u003c\/p\u003e\n\u003cp\u003eEC-Council's Certified Network Defender(C|ND) is an essential vendor-neutral network security certification for every IT and systems administrator who needs to operate with a secure mindset.\u003c\/p\u003e\n\u003cp\u003eStudents will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and Mobile. They will also acquire knowledge of effective proper log analysis, network traffic monitoring, basic investigation and response, as well as business continuity and disaster recovery.\u003c\/p\u003e\n\u003cp\u003eAdditionally, they will dive into threats, analyzing the attack surface, and studying threat prediction and threat intelligence as it relates to their administration and defense responsibilities.\u003c\/p\u003e\n\u003cp\u003eOften referred to as blue-teaming, C|NDs will be able to apply defense and counter measure strategies in their organizations, playing a critical role not only in attack prevention but also in detection, response, and remediation as they configure networks and systems to operate securely.\u003c\/p\u003e\n\u003cp\u003eThe C|ND program will cover the concepts and fortify skills through hands-on practice across over 100+ labs delivered on live target machines. The C|ND program designed by industry experts prepares network defenders with strategic, technological, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.\u003c\/p\u003e\n\u003cp\u003eC|ND is a network security course designed to help organizations create and deploy the most comprehensive network security system. C|ND is mapped to the below job roles based on common job role frameworks recognized by organizations worldwide. C|ND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat will you learn\u003c\/strong\u003e\u003c\/p\u003e\n\u003col\u003e\n\u003cli\u003ePlanning and administering network security for organizations\u003c\/li\u003e\n\u003cli\u003eRecognizing security risks, threats, and vulnerabilities\u003c\/li\u003e\n\u003cli\u003eEnsuring compliance with regulatory standards\u003c\/li\u003e\n\u003cli\u003eDesigning and implementing network security policies\u003c\/li\u003e\n\u003cli\u003eApplying security principles in distributed and mobile computing environment\u003c\/li\u003e\n\u003cli\u003eImplementing Identity and Access Management, encryption, and network segmentation\u003c\/li\u003e\n\u003cli\u003eManaging Windows and Linux Security Administration\u003c\/li\u003e\n\u003cli\u003eAddressing security risks in mobile devices and IoT\u003c\/li\u003e\n\u003cli\u003eImplementing strong data security techniques\u003c\/li\u003e\n\u003cli\u003eManaging security in virtualization technologies and cloud platforms\u003c\/li\u003e\n\u003cli\u003eImplementing wireless network security\u003c\/li\u003e\n\u003cli\u003eConducting risk and vulnerability assessments\u003c\/li\u003e\n\u003cli\u003eProviding first response to security incidents\u003c\/li\u003e\n\u003cli\u003eIdentifying Indicators of Compromise and Attack\u003c\/li\u003e\n\u003cli\u003eIntegrating threat intelligence for proactive defense\u003c\/li\u003e\n\u003cli\u003eConducting Attack Surface Analysis\u003c\/li\u003e\n\u003cli\u003eAssisting in Business Continuity and Disaster Recovery planning\u003c\/li\u003e\n\u003cli\u003eMonitoring network traffic and performing log management\u003c\/li\u003e\n\u003cli\u003eManaging proxy, content filtering, and troubleshooting network issues\u003c\/li\u003e\n\u003cli\u003eHardening security of endpoints and selecting firewall solutions\u003c\/li\u003e\n\u003cli\u003eConfiguring IDS\/IPS for enhanced security\u003c\/li\u003e\n\u003cli\u003eMaintaining an inventory of network devices\u003c\/li\u003e\n\u003cli\u003eProviding security awareness guidance and training\u003c\/li\u003e\n\u003cli\u003eManaging AAA for network devices\u003c\/li\u003e\n\u003cli\u003eReviewing audit logs and analyzing security anomalies\u003c\/li\u003e\n\u003cli\u003eMaintaining and configuring security platforms\u003c\/li\u003e\n\u003cli\u003eEvaluating security products and operations procedures\u003c\/li\u003e\n\u003cli\u003eIdentifying and classifying organizational assets\u003c\/li\u003e\n\u003cli\u003eImplementing system integrity monitoring tools\u003c\/li\u003e\n\u003cli\u003eUnderstanding EDR\/XDR and UEBA solutions\u003c\/li\u003e\n\u003cli\u003eConducting PIA processes for privacy assessment\u003c\/li\u003e\n\u003cli\u003eCollaborating on threat hunting and incident response\u003c\/li\u003e\n\u003cli\u003eUnderstanding SOAR platforms in cybersecurity operations\u003c\/li\u003e\n\u003cli\u003eIntegrating Zero Trust principles into security architectures\u003c\/li\u003e\n\u003cli\u003eStaying updated on emerging cyber threats\u003c\/li\u003e\n\u003cli\u003eUnderstanding the role of AI\/ML in cyber defense.\u003c\/li\u003e\n\u003c\/ol\u003e\n\u003cp\u003e\u003cstrong\u003eTarget Audience\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eStudents\/IT Professionals\/Any other industry professionals planning a career in cybersecurity.\u003c\/p\u003e\n\u003cp\u003eAnyone who wants to start a career in the blue team and network security.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline\u003c\/strong\u003e\u003c\/p\u003e\n\u003col\u003e\n\u003cli\u003eNetwork Attacks and Defense Strategies\u003c\/li\u003e\n\u003cli\u003eAdministrative Network Security\u003c\/li\u003e\n\u003cli\u003eTechnical Network Security\u003c\/li\u003e\n\u003cli\u003eNetwork Perimeter Security\u003c\/li\u003e\n\u003cli\u003eEndpoint Security - Windows Systems\u003c\/li\u003e\n\u003cli\u003eEndpoint Security - Linux Systems\u003c\/li\u003e\n\u003cli\u003eEndpoint Security - Mobile Devices\u003c\/li\u003e\n\u003cli\u003eEndpoint Security - IoT Devices\u003c\/li\u003e\n\u003cli\u003eAdministrative Application Security\u003c\/li\u003e\n\u003cli\u003eData Security\u003c\/li\u003e\n\u003cli\u003eEnterprise Virtual Network Security\u003c\/li\u003e\n\u003cli\u003eEnterprise Cloud Network Security\u003c\/li\u003e\n\u003cli\u003eEnterprise Wireless Network Security\u003c\/li\u003e\n\u003cli\u003eNetwork Traffic Monitoring and Analysis\u003c\/li\u003e\n\u003cli\u003eNetwork Logs Monitoring and Analysis\u003c\/li\u003e\n\u003cli\u003eIncident Response and Forensic Investigation\u003c\/li\u003e\n\u003cli\u003eBusiness Continuity and Disaster Recovery\u003c\/li\u003e\n\u003cli\u003eRisk Anticipation with Risk Management\u003c\/li\u003e\n\u003cli\u003eThreat Assessment with Attack Surface Analysis\u003c\/li\u003e\n\u003cli\u003eThreat Prediction with Cyber Threat Intelligence\u003c\/li\u003e\n\u003c\/ol\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003col\u003e\u003c\/ol\u003e","brand":"EC-Council","offers":[{"title":"Default Title","offer_id":43964881109123,"sku":null,"price":2199.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/ECCouncil_79202fab-b0a5-43de-99f5-e94bf842f8de.png?v=1712632796"},{"product_id":"ec-council-certified-ethical-hacker-ilearn","title":"EC-Council Certified Ethical Hacker (CEH) iLearn","description":"\u003cp\u003eThis solution is an asynchronous, self-study environment in a video streaming format.\u003c\/p\u003e\n\u003cp\u003eThe Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.\u003c\/p\u003e\n\u003cp\u003eIn its 12th version, the Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.\u003c\/p\u003e\n\u003cp\u003eThe C|EH v12 also equips aspiring cybersecurity professionals with the tactics, techniques, and procedures (TTPs) to build ethical hackers who can uncover weaknesses in nearly any type of target system before cybercriminals do.\u003c\/p\u003e\n\u003cp\u003eThe C|EH®v12 is a specialized and one-of-a-kind training program to teach you everything you need to know about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and global hacking competition. Stay on top of the game with the most in-demand skills required to succeed in the field of cybersecurity\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat you will learn\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThe C|EH®v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50\/50 between knowledge-based training and hands-on application through our cyber range. Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.\u003c\/p\u003e\n\u003cp\u003eCourse Outline\u003c\/p\u003e\n\u003cp\u003e20 Modules That Help You Master the Foundations of Ethical Hacking and Prepare to Take the C|EH Certification Exam\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 1 - Introduction to Ethical Hacking\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eCover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 2 - Foot Printing and Reconnaissance\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 3 - Scanning Networks\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn different network scanning techniques and countermeasures\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 4 – Enumeration\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 5 - Vulnerability Analysis\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 6 - System Hacking\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about the various system hacking methodologies—including ste-ganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 7 - Malware Threats\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn different types of malware (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 8 – Sniffing\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 9 - Social Engineering\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 10 - Denial-of-Service\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about different Denial of Service (DoS) and Distributed DoS(DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 11 - Session Hijacking\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eUnderstand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 12 - Evading IDS, Firewalls, and Honeypots\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eGet introduced to firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 13 - Hacking Web Servers\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 14 - Hacking Web Applications\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 15 - SQL Injection\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about SQL injection attacks, evasion techniques, and SQL injection countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 16 - Hacking Wireless Networks\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eUnderstand different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi security tools, and countermeasures.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 17 - Hacking Mobile Platforms\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 18 - IoT and OT Hacking\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 19 - Cloud Computing\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 20 – Cryptography\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eLearn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.\u003cbr\u003e\u003c\/p\u003e\n\u003col\u003e\u003c\/ol\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003col\u003e\u003c\/ol\u003e","brand":"EC-Council","offers":[{"title":"Default Title","offer_id":43964923412611,"sku":null,"price":2199.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/ECCouncil_00bbd892-4d17-405a-8bd1-baf310eaf848.png?v=1712633473"},{"product_id":"ec-council-certified-incident-handler-ilearn","title":"EC-Council Certified Incident Handler (CIH) iLearn","description":"\u003cp\u003eThis solution is an asynchronous, self-study environment in a video streaming format.\u003c\/p\u003e\n\u003cp\u003eEC-Council's Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.\u003c\/p\u003e\n\u003cp\u003eThis program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH\u0026amp;R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.\u003c\/p\u003e\n\u003cp\u003eThe E|CIH (EC-Council Certified Incident Handler) also covers post incident activities such as containment, eradication, evidence gathering and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.\u003c\/p\u003e\n\u003cp\u003eThe E|CIH is a method-driven course that provides a holistic approach covering vast concepts related to organizational IH\u0026amp;R, from preparing\/planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.\u003c\/p\u003e\n\u003cp\u003eWith over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.\u003c\/p\u003e\n\u003cp\u003eThe E|CIH program addresses all stages involved in the IH\u0026amp;R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH\u0026amp;R-related certifications in the market today.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat will you learn\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eKey issues plaguing the information security world.\u003c\/li\u003e\n\u003cli\u003eVarious types of cyber security threats, attack vectors, threat actors, and their motives, goals, and objectives of cyber security attacks\u003c\/li\u003e\n\u003cli\u003eVarious attack and defense frameworks (Cyber Kill Chain Methodology, MITRE ATT\u0026amp;CK Framework, etc.)\u003c\/li\u003e\n\u003cli\u003eFundamentals of information security concepts (Vulnerability assessment, risk management, cyber threat intelligence, threat modeling, and threat hunting)\u003c\/li\u003e\n\u003cli\u003eFundamentals of incident management (information security incidents, signs and costs of an incident, incident handling and response, and incident response automation and orchestration)\u003c\/li\u003e\n\u003cli\u003eDifferent incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations\u003c\/li\u003e\n\u003cli\u003eVarious steps involved in planning incident handling and response program (Planning, recording and assignment, triage, notification, containment, evidence gathering and forensic analysis, eradication, recovery, and post-incident activities)\u003c\/li\u003e\n\u003cli\u003eImportance of first response and first response procedure (Evidence collection, documentation, preservation, packaging, and transportation)\u003c\/li\u003e\n\u003cli\u003eHow to handle and respond to different types of cybersecurity incidents in a systematic way (malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, insider threat-related incidents, and endpoint security incidents)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eTarget Audience\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eAny mid-level to high-level cyber security professionals with a minimum of 3years of experience\u003c\/li\u003e\n\u003cli\u003eIndividuals from the information security profession and who want to enrich their skills and knowledge in the field of incident handling and response.\u003c\/li\u003e\n\u003cli\u003eIndividuals interested in preventing cyber threats.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eMODULE 01: INTRODUCTION TO INCIDENT HANDLING AND RESPONSE\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand Information Security Threats and Attack Vectors\u003c\/li\u003e\n\u003cli\u003eExplain Various Attack and Defense Frameworks\u003c\/li\u003e\n\u003cli\u003eUnderstand Information Security Concepts\u003c\/li\u003e\n\u003cli\u003eUnderstand Information Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Incident Management Process\u003c\/li\u003e\n\u003cli\u003eUnderstand Incident Response Automation and Orchestration\u003c\/li\u003e\n\u003cli\u003eDescribe Various Incident Handling and Response Best Practices\u003c\/li\u003e\n\u003cli\u003eExplain Various Standards Related to Incident Handling and Response\u003c\/li\u003e\n\u003cli\u003eExplain Various Cybersecurity Frameworks\u003c\/li\u003e\n\u003cli\u003eUnderstand Incident Handling Laws and Legal Compliance\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 02: INCIDENT HANDLING AND RESPONSE PROCESS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand Incident Handling and Response (IH\u0026amp;R) Process\u003c\/li\u003e\n\u003cli\u003eExplain Preparation Steps for Incident Handling and Response\u003c\/li\u003e\n\u003cli\u003eUnderstand Incident Recording and Assignment\u003c\/li\u003e\n\u003cli\u003eUnderstand Incident Triage\u003c\/li\u003e\n\u003cli\u003eExplain the Process of Notification\u003c\/li\u003e\n\u003cli\u003eUnderstand the Process of Containment\u003c\/li\u003e\n\u003cli\u003eDescribe Evidence Gathering and Forensics Analysis\u003c\/li\u003e\n\u003cli\u003eExplain the Process of Eradication\u003c\/li\u003e\n\u003cli\u003eUnderstand the Process of Recovery\u003c\/li\u003e\n\u003cli\u003eDescribe Various Post-Incident Activities\u003c\/li\u003e\n\u003cli\u003eExplain the Importance of Information Sharing Activities\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 03: FIRST RESPONSE\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the Concept of First Response\u003c\/li\u003e\n\u003cli\u003eUnderstand the Process of Securing and Documenting the Crime Scene\u003c\/li\u003e\n\u003cli\u003eUnderstand the Process of Collecting Evidence at the Crime Scene\u003c\/li\u003e\n\u003cli\u003eExplain the Process for Preserving, Packaging, and Transporting Evidence\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 04: HANDLING AND RESPONDING TO MALWARE INCIDENTS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the Handling of Malware Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Preparation for Handling Malware Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand Detection of Malware Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Containment of Malware Incidents\u003c\/li\u003e\n\u003cli\u003eDescribe How to Perform Malware Analysis\u003c\/li\u003e\n\u003cli\u003eUnderstand Eradication of Malware Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Recovery after Malware Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Malware Incidents - Case Study\u003c\/li\u003e\n\u003cli\u003eDescribe Best Practices against Malware Incidents\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 05: HANDLING AND RESPONDING TO EMAIL SECURITY INCIDENTS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand Email Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Preparation Steps for Handling Email Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand Detection and Containment of Email Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand Analysis of Email Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Eradication of Email Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Process of Recovery after Email Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Email Security Incidents - Case Study\u003c\/li\u003e\n\u003cli\u003eExplain Best Practices against Email Security Incidents\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 06: HANDLING AND RESPONDING TO NETWORK SECURITY\u003c\/p\u003e\n\u003cp\u003eINCIDENTS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the Handling of Network Security Incidents\u003c\/li\u003e\n\u003cli\u003ePrepare to Handle Network Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand Detection and Validation of Network Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Unauthorized Access Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Inappropriate Usage Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Denial-of-Service Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Wireless Network Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Network Security Incidents - Case Study\u003c\/li\u003e\n\u003cli\u003eDescribe Best Practices against Network Security Incidents\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 07: HANDLING AND RESPONDING TO WEB APPLICATION SECURITY\u003c\/p\u003e\n\u003cp\u003eINCIDENTS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the Handling of Web Application Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Preparation for Handling Web Application Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand Detection and Containment of Web Application Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Analysis of Web Application Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand Eradication of Web Application Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Recovery after Web Application Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Web Application Security Incidents - Case Study\u003c\/li\u003e\n\u003cli\u003eDescribe Best Practices for Securing Web Applications\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 08: HANDLING AND RESPONDING TO CLOUD SECURITY INCIDENTS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the Handling of Cloud Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain Various Steps Involved in Handling Cloud Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand How to Handle Azure Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand How to Handle AWS Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand How to Handle Google Cloud Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Cloud Security Incidents - Case Study\u003c\/li\u003e\n\u003cli\u003eExplain Best Practices against Cloud Security Incidents\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 09: HANDLING AND RESPONDING TO INSIDER THREATS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the Handling of Insider Threats\u003c\/li\u003e\n\u003cli\u003eExplain Preparation Steps for Handling Insider Threats\u003c\/li\u003e\n\u003cli\u003eUnderstand Detection and Containment of Insider Threats\u003c\/li\u003e\n\u003cli\u003eExplain Analysis of Insider Threats\u003c\/li\u003e\n\u003cli\u003eUnderstand Eradication of Insider Threats\u003c\/li\u003e\n\u003cli\u003eUnderstand the Process of Recovery after Insider Attacks\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Insider Threats - Case Study\u003c\/li\u003e\n\u003cli\u003eDescribe Best Practices against Insider Threats\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eMODULE 10: HANDLING AND RESPONDING TO ENDPOINT SECURITY INCIDENTS\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the Handling of Endpoint Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain the Handling of Mobile-based Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain the Handling of IoT-based Security Incidents\u003c\/li\u003e\n\u003cli\u003eExplain the Handling of OT-based Security Incidents\u003c\/li\u003e\n\u003cli\u003eUnderstand the Handling of Endpoint Security Incidents - Case Study\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003col\u003e\u003c\/ol\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003col\u003e\u003c\/ol\u003e","brand":"EC-Council","offers":[{"title":"Default Title","offer_id":43964988850307,"sku":null,"price":1399.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/ECCouncil_a0d2f281-0680-420e-bb39-65429134a090.png?v=1712634971"},{"product_id":"sc-5003-implement-information-protection-and-data-loss-prevention-by-using-microsoft-purview-lab","title":"SC-5003: Implement information protection and data loss prevention by using Microsoft Purview Lab","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/p\u003e\n\u003cp\u003eGain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization's data.\u003c\/p\u003e\n\u003cp\u003eLabs are available in English.\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":44071752302723,"sku":null,"price":24.04,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-22_5c1062db-84b3-45be-94a1-4424d3f5fe55.png?v=1713383813"},{"product_id":"information-security-foundation-based-on-iso-iec-27002-courseware","title":"Information Security Foundation based on ISO\/IEC 27002 Courseware","description":"\u003cp\u003e\u003cspan lang=\"EN-GB\" style=\"font-size: 11.0pt; mso-bidi-font-size: 10.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-GB; mso-fareast-language: NL; mso-bidi-language: AR-SA;\"\u003eInformation Security Foundation based on ISO\/IEC 27002 Courseware is for anyone who wants to deliver courses aimed at passing the ISFS (Information Security Foundation) exam of EXIN.\u003cbr\u003e\u003cbr\u003eThis courseware is primarily developed for a classroom training in Information Security Foundation based on ISO\/IEC 27002. The basis for this courseware is the 3rd revised edition of the study book Foundations of Information Security Based on ISO27001 and ISO27002. The various modules in the courseware relate to paragraphs of this study book, per slide pointing out where additional information on each subject can be found.\u003cbr\u003e\u003cbr\u003eIn Module 7, an ISFS model exam training from the book is given, including an explanation to all multiple choice options, so that it can be used during a training for the ISFS exam.\u003cbr\u003e \u003cbr\u003eThe courseware contains the following:\u003cbr\u003e•       Module 1: About EXIN\u003cbr\u003e•       Module 2: Information and security, ISO 2700x                      \u003cbr\u003e•       Module 4: Approach and organization        \u003cbr\u003e              Security policy and security organization\u003cbr\u003e              Components\u003cbr\u003e              Incident management\u003cbr\u003e•       Module 5: Measures         \u003cbr\u003e              Importance of measures\u003cbr\u003e              Physical security measures\u003cbr\u003e              Technical measures          \u003cbr\u003e              Organizational measures\u003cbr\u003e•       Module 6: Legislation      \u003cbr\u003e              Legislation and regulations\u003cbr\u003e•       Module 7: Exam training (from book)                        \u003cbr\u003e•       Module 8: Exam\u003cbr\u003e•       EXIN Sample exam\u003cbr\u003e                                                                                                    \u003cbr\u003e•       EXIN Preparation Guide \u003cbr\u003e\u003cbr\u003eThe Certificate EXIN Information Security Foundation based on ISO\/IEC 27002 is part of the qualification program Information Security. The module is followed up by the Certificates EXIN Information Security Management Advanced based on ISO\/IEC 27002 and EXIN Information Security Management Expert based on ISO\/IEC 27002.\u003cbr style=\"mso-special-character: line-break;\"\u003e\u003c!-- [if !supportLineBreakNewLine]--\u003e\u003cbr style=\"mso-special-character: line-break;\"\u003e\u003c!--[endif]--\u003e\u003c\/span\u003e\u003c\/p\u003e","brand":"Van Haren Publishing","offers":[{"title":"Default Title","offer_id":44251699118211,"sku":"","price":86.54,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-166.png?v=1715655473"},{"product_id":"open-information-security-management-maturity-model-o-ism3-courseware","title":"Open Information Security Management Maturity Model (O-ISM3) Courseware","description":"\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eAll businesses need information security to protect our systems from the risk of threats. This Open Information Security Management Maturity Model (O-ISM3) supports information security practitioners in this fundamental task\u003cspan style=\"mso-spacerun: yes;\"\u003e  \u003c\/span\u003eby covering the key areas required to minimise these threats:\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\"\u003e\n\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eRisk Management \u003c\/span\u003e\u003c\/b\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003e: identifying and estimating levels of exposure to the likelihood of loss and how to manage those risks of loss; \u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli class=\"MsoNormal\"\u003e\n\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eSecurity Controls \u003c\/span\u003e\u003c\/b\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003e: crafting the IT Security Policy which assures operations are as secure as they need to be;\u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli class=\"MsoNormal\"\u003e\n\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eSecurity Management \u003c\/span\u003e\u003c\/b\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003e: supporting the selection, maintenance, and overall Security Policy for the security controls deployed in a business enterprise.\u003c\/span\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eThe O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eThe distinctive benefits of O-ISM3 are:\u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eA fully process-based approach\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eIt breaks information security management down into a comprehensive but manageable number of processes, with specifically relevant security control(s) being identified.\u003cspan style=\"mso-spacerun: yes;\"\u003e  \u003c\/span\u003eIn addition it covers the principles of continuous improvement that O-ISM3 supports.\u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eMaturity coverage\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eO-ISM3 defines information security management maturity in terms of the operation of an appropriate complementary set of ISM3 information security processes. \u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eA business approach\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eThe coverage considers the business drivers and also the specific business challenges\u003cspan style=\"mso-spacerun: yes;\"\u003e  \u003c\/span\u003eof outsourcing and partnering. The critical issue of how to translate key business objectives to security objectives and targets is covered in depth.\u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eCompatibility with ISO 9000 Quality Management\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eWith similarities in structure and approach to quality management methods like ISO 9000, O-ISM3 also emphasises the practical and the measurable so that ISMSs can adapt without re-engineering in the face of changes to technology and risk.\u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eCompatibility with ISO\/IEC 27000\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eISM3 is compatible in many ways with the ISO\/IEC 27000:2009 standard, in addition provides a comprehensive framework for selecting, implementing, and managing a set of security processes to meet measurable business goals. \u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eCompatibility with COBIT\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eO-ISM3 implementations use a management responsibilities framework consistent with the ISACA COBIT framework model. \u003c\/span\u003e\u003c\/p\u003e\n\u003cul style=\"margin-top: 0in;\" type=\"disc\"\u003e\n\u003cli class=\"MsoNormal\" style=\"mso-list: l0 level1 lfo1;\"\u003e\u003cb\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eCompatibility with ITIL\u003c\/span\u003e\u003c\/b\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan lang=\"EN-GB\" style=\"mso-bidi-font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-ansi-language: EN-GB;\"\u003eITIL users can use the O-ISM3 process orientation to strengthen their ITIL security processes.\u003c\/span\u003e\u003cspan lang=\"NL\"\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan lang=\"EN-GB\" style=\"font-size: 11.0pt; mso-bidi-font-size: 10.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-GB; mso-fareast-language: NL; mso-bidi-language: AR-SA;\"\u003e\u003cbr style=\"mso-special-character: line-break;\"\u003e\u003c!--[endif]--\u003e\u003c\/span\u003e\u003c\/p\u003e","brand":"Van Haren Publishing","offers":[{"title":"Default Title","offer_id":44251720974467,"sku":null,"price":32.31,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-165.png?v=1715657154"},{"product_id":"essential-information-security-courseware","title":"Essential Information Security Courseware","description":"\u003cp\u003eThis book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south.\u003c\/p\u003e\n\u003cp\u003eEvery new security practitioner should start with this book, which covers the most relevant topics like cloud security, mobile device security and network security and provides a comprehensive overview of what is important in information security. Processes, training strategy, policies, contingency plans, risk management and effectiveness of tools are all extensively discussed.\u003cbr\u003e\u003c\/p\u003e","brand":"Van Haren Publishing","offers":[{"title":"Default Title","offer_id":44251773599875,"sku":null,"price":43.09,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-159.png?v=1715658967"},{"product_id":"sc-5007-implement-retention-ediscovery-and-communication-compliance-in-microsoft-purview","title":"SC-5007: Implement retention eDiscovery and Communication compliance in Microsoft Purview Lab","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/p\u003e\n\u003cp\u003eManage data lifecycle, records management, eDiscovery, and communication compliance with Microsoft Purview.\u003c\/p\u003e\n\u003cp\u003eLabs are available in English.\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":44676756996227,"sku":null,"price":30.4,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-22_5c1062db-84b3-45be-94a1-4424d3f5fe55.png?v=1713383813"},{"product_id":"cysa-self-paced-training","title":"CySA+ Self-Paced Training","description":"\u003cdiv\u003e\u003cspan\u003eThis course covers the skills needed to become a cybersecurity analyst. The student will learn threat intelligence and threat hunting concepts and techniques along with the ability to identify and analyze malicious activity. In addition, the student will learn incident response and vulnerability management so they can properly report and communicate to all stakeholders in an organization.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eThere is no required experience. However, the student is recommended to have knowledge and\/or hands on experience of incident response due to malware or hacking activity. This includes at least some experience with Windows servers and clients, Linux operating systems and utilities, and IP networking. It’s also helpful to have experience with anti-malware applications and some removal tools.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"Default\"\u003e\n\u003cb\u003e\u003cspan style=\"font-family: 'Aptos',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;\"\u003eCourse Outline \u003c\/span\u003e\u003c\/b\u003e\u003cspan style=\"color: #32458a; letter-spacing: -.3pt;\"\u003e\u003c\/span\u003e\n\u003c\/h4\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 1: Security Operations\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eThe importance of system and network architecture concepts in security operations\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eLog ingestions\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eOperating system (OS) concepts\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eInfrastructure concepts\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eNetwork architecture\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eIdentity and access management\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eEncryption\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSensitive data protection\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eAnalyze indicators of potentially malicious activity\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eNetwork activity\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eHost-related\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eApplication-related\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSocial engineering and obfuscated links\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 2: Threat Hunting Concepts and Tools\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eUse appropriate tools or techniques to determine malicious activity\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eTools\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCommon techniques\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eProgramming languages\/scripting\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eThreat-intelligence and threat-hunting concepts\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eThreat actors\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eTactics, techniques, and procedures (TTP)\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eConfidence levels\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCollection methods and sources\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eThreat hunting\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 3: Process Improvement and Vulnerability Methods\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eThe importance of efficiency and process improvement in security operations\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eStandardize processes\u003cspan style=\"mso-spacerun: yes;\"\u003e   \u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eStreamline operations\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eTechnology and tool integration\u003cspan style=\"mso-spacerun: yes;\"\u003e   \u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSingle pane of glass\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eImplement vulnerability scanning methods and concepts\u003cspan style=\"mso-spacerun: yes;\"\u003e   \u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAsset discovery\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSpecial considerations\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eInternal vs. external scanning\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCredentialed vs. non-credentialed\u003cspan style=\"mso-spacerun: yes;\"\u003e   \u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePassive vs. active\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eStatic vs. dynamic\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCritical infrastructure\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSecurity baseline scanning\u003cspan style=\"mso-spacerun: yes;\"\u003e   \u003c\/span\u003e\n\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eIndustry frameworks\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 4: Data and Vulnerability Prioritization\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eAnalyze output from vulnerability assessment tools\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eNetwork scanning and mapping\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eWeb application scanners\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eVulnerability scanners\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eDebuggers\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eMultipurpose\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCloud infrastructure assessment tools\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eAnalyze data to prioritize vulnerabilities\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCommon Vulnerability Scoring System (CVSS) interpretation\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eValidation\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eContext awareness\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eExploitability\/weaponization\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAsset value\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eZero-day\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 5: Mitigation Techniques\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eRecommend controls to mitigate attacks and software vulnerabilities\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCross-site scripting\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eOverflow vulnerabilities\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eData poisoning\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eBroken access control\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCryptographic failures\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eInjection flaws\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCross-site request forgery\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eDirectory traversal\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eInsecure design\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSecurity misconfiguration\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eEnd-of-life or outdated components\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eIdentification and authentication failures\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eServer-side request forgery\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eRemote code execution\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePrivilege escalation\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eLocal file inclusion (LFI)\/remote file inclusion (RFI)\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 6: Patching and Securing Data\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eConcepts related to vulnerability response, handling, and management\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCompensating control\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eControl types\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePatching and configuration management\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePatching and configuration managements\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eExceptions\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eRisk management principles\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePolicies, governance, and service level objectives (SLOs)\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePrioritization and escalation\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAttack surface management\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSecure coding best practices\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSecure software development life cycle (SDLC)\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eThreat modeling\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 7: Attacks Methods and Responses\u003cspan style=\"mso-spacerun: yes;\"\u003e   \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eAttack methodology frameworks\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCyber kill chains\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eDiamond Model of Intrusion Analysis\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eMITRE ATT\u0026amp;CK\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eOpen Source Security Testing Methodology Manual (OSS TMM)\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eOWASP Testing Guide\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003ePerform incident response activities\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eDetection and analysis\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eContainment, eradication, and recovery\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003ePreparation and post-incident activity phases of the incident management life cycle\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePreparation\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePost-incident activity\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 8 Reporting\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eThe importance of vulnerability management reporting\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eVulnerability management reporting\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCompliance reports\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAction plans\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eMetrics and key performance indicators (KPIs)\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eStakeholder identification and communication\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eModule 9 Communication\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eThe importance of communication\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eStakeholder identification and communication\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eIncident declaration and escalation\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eIncident response reporting\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCommunications\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eRoot cause analysis\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eLessons learned\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eMetrics and KPIs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003ch4 class=\"MsoNormal\"\u003eCourse Summary\u003c\/h4\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eVideos: 23\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eLabs: 12\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eText Lessons: 45\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eQuizzes: 9\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003ePractice Exams: 2\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eTotal Time: Approx. 31 hours\u003c\/p\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45013331214467,"sku":null,"price":229.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-231.png?v=1733114134"},{"product_id":"pentest-self-paced-training","title":"PenTest+ Self-Paced Training","description":"\u003cdiv\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\u003cspan\u003eThis cybersecurity course trains students to assess network security and prevent attacks through use of penetration testing and vulnerability assessments in cloud, hybrid, mobile, IoT and traditional environments.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eCompTIA PenTest+ is a certification that ensures that IT professionals are up to date on relevant penetration testing skills in any environment.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003ch4\u003e\u003cspan\u003eAudience Profile and Requirements\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv\u003e\u003cspan\u003eStudents are recommended to understand A+, basic networking and basic network security and have experience using Windows and Linux operating systems. \u003c\/span\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"Default\"\u003e\n\u003cb\u003e\u003cspan style=\"font-family: 'Aptos',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;\"\u003eCourse Outline \u003c\/span\u003e\u003c\/b\u003e\u003cspan style=\"color: #32458a; letter-spacing: -.3pt;\"\u003e\u003c\/span\u003e\n\u003c\/h4\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 1: Engagement Planning\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.1 Assessment Types and Goals\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.2 The Penetration Testing Process\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.3 Documentation and Planning\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.4 Engagement Scope\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.5 Scripting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Scripting Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Analyze Automation Script \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 1\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 2: Reconnaissance\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e2.1 Reconnaissance Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Passive Reconnaissance Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e2.2 OSINT Gathering\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 2\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 3: Active Reconnaissance\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e3.1 Network Scanning\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Active Reconnaissance Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e3.2 Vulnerability Scanning\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Vulnerability Scanning (NMAP) \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Vulnerability Scanning (OpenVAS)\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e3.3 Application Testing\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 3\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 4: Leveraging Target Information\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e4.1 Vulnerability Analysis\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Analysis of Reconnaissance Results\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e4.2 Exploitation Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 4 \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eMidterm Exam\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 5: Exploiting Organizational Vulnerabilities\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e5.1 Social Engineering\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Social Engineering Attacks and Exploits\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e5.2 Physical Security Attacks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e5.3 Cloud Technology Attacks \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 5\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 6: Exploiting Network Vulnerabilities\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e6.1 Network Attacks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Different Types of Network Attack Tools\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e6.2 Wireless Attacks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: On-Path Network Attacks \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 6\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 7: Exploiting Applications\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e7.1 Attacking Insecure Code\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e7.2 Attacking Web Applications\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Exploiting Application Vulnerabilities \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Application Tools and Attack Vectors \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Application Injection attacks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 7\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 8: Host Exploitation\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e8.1 Finding Host Vulnerabilities\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e8.2 Operating System Exploits\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e8.3 Post-Exploitation Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Post-Exploitation Exfiltration and Detection Avoidance\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Post-Exploitation Foothold Techniques \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 8\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 9: Engagement Follow-up\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e9.1 Report Preparation\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Compiling a Penetration Testing Report\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e9.2 Remediation and Follow-up\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Remediation Recommendations \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 9\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eFinal Exam\u003c\/span\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"MsoNormal\"\u003eCourse Summary\u003c\/h4\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eVideos: 17\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eLabs: 18\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eText Lessons: 25\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eQuizzes: 9\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003ePractice Exams: 2\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eTotal Time: Approx. 49 hours 45 minutes\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45044234158211,"sku":null,"price":229.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-232.png?v=1734316138"},{"product_id":"network-self-paced-training","title":"Network+ Self-Paced Training","description":"\u003cdiv\u003e\n\u003cdiv\u003eAscend’s Networking course covers both wired and wireless networks. Individuals taking the course will come away with a strong grasp of networking principles and the ability to pass the Network+ certification exam with a high degree of confidence. The skills learned in this course will set students up for more advanced concepts if you’re looking to further your IT education. Before taking this course, individuals should have the knowledge and skills to troubleshoot, configure, and manage company networks. This certification is an approved DoD 8570 baseline certification, and professionals with this certification can enter the IT workforce as a network field technician or a junior network administrator.\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"Default\"\u003e\n\u003cb\u003e\u003cspan style=\"font-family: 'Aptos',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;\"\u003eCourse Outline \u003c\/span\u003e\u003c\/b\u003e\u003cspan style=\"color: #32458a; letter-spacing: -.3pt;\"\u003e\u003c\/span\u003e\n\u003c\/h4\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 1: Fundamentals\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.1 Networking Concepts\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.2 Classifying Networks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Networking Topologies and Characteristics\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.3 Network Models\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Introduction to the OSI Model\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e1.4 The Troubleshooting Process\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Network Troubleshooting Techniques\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Troubleshooting Common Networking Issues  \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 1\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 2: LAN Technologies\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e2.1 Connection Technologies\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e2.2 Network Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Defining Networking Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Routing Concepts and Protocols   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 2\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 3: Physical Connections\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e3.1 Copper Media\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Physical Networking Tools   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Cable and Connector Types\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e3.2 Optical Media\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Cable Management Solutions\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e3.3 Ethernet Standards\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Troubleshooting Cable Connectivity   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 3\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 4: IP Addressing\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e4.1 IP Addresses\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Internet Protocol Addressing Solutions\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e4.2 IP Address Resolution and Assignment\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: DHCP Server Installation and Configuration   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Configuring and Maintaining DNS Servers\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 4\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 5: TCP\/IP Protocols\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e5.1 Core Protocols\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Network Services and Protocols\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e5.2 Network Ports and Applications   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Network Command Line Tools   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: NTP Server Management\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 5\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 6: Internetworking\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e6.1 Switching\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Configuring Switching Features\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e6.2 Routing\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e6.3 Data-Center Architecture\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 6\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 7: Wireless LANs\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e7.1 Wireless Networks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e7.2 Wireless LAN Standards\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Wireless Configuration Techniques and Standards   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Troubleshooting and Security Wireless Networks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 7\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 8: Wide Area Networks\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e8.1 Internet Connections\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e8.2 WAN Infrastructure\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 8\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 9: Cybersecurity Principles\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e9.1 Goals and Threats\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e9.2 Digital Security\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e9.3 Transport Encryption\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 9\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 10: Defending Networks\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e10.1 Network Security Components\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Network Security Concepts Fundamentals   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Remote Access and Management\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e10.2 Physical Security\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Physical Network Security Concepts\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e10.3 Network Authentication Systems\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e10.4 Hardening Networks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Networking Hardening Techniques and Best Practices   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 10\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 11: Evolving Network Technologies\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e11.1 Network Convergence\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: General Network Attacks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e11.2 Virtual and Cloud Systems   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Virtual Network Concepts   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Cloud Concepts\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 11\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 12: Network Operations\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e12.1 Monitoring and Optimization\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Networking Device Monitoring\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e12.2 Fault Tolerance and Disaster Recovery   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Load Balancing and NIC Teaming\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: High Availability and disaster Recovery Concepts\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e12.3 Incident Response\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 12\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 13: Network Planning\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e13.1 Network Policy Design\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Organizational Documentation and Procedures\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Organizational Networking Diagrams and Agreements\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e13.2 Network Installation\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Network Architecture\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e13.3 Maintenance and Upgrades   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Network Analysis Software   \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eQuiz 13\u003c\/span\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"MsoNormal\"\u003e\u003c\/h4\u003e\n\u003ch4 class=\"MsoNormal\"\u003eCourse Summary\u003c\/h4\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eVideos: 53\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eLabs: 33\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eText Lessons: 35\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eQuizzes: 13\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eTotal Time: Approx. 60 hours, 20 minutes\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45044263190659,"sku":null,"price":229.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-236.png?v=1734317832"},{"product_id":"a-self-paced-training","title":"A+ Self-Paced Training","description":"\u003cdiv\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\u003cspan\u003eAscend Education’s A+ Training Course is designed to cover CompTIA’s exam objectives and prepare students to enter the workforce with essential computing skills. This guide is suitable for both classroom and self-study aspirants.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eStudents will benefit most from this course if they intend to take a CompTIA A+ 220-1101 \u0026amp; 220-1102 exams. Ascend Education is a CompTIA Authorized Partner and can provide students with a discount code for those certification exams.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eThis course includes six modules. Each module contains written instruction, video instruction, and virtual training labs or simulations. Labs and simulations are designed to give a “hands on” learning experience. Additionally, practice quizzes are integrated into each Module. Students should take each quiz to test what they have learned. After students have completed the course, they should spend time reviewing the material and practicing in the virtual lab environment in order to solidify what they have learned. After an appropriate review of course material, students should take a final exam (included with this course), and then consider sitting for the CompTIA A+ Certification exam.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eWhether a student wishes to take the exam or not, they will attain an introduction to the core principles and skills of information technology. After an appropriate review of course material, students should take a final exam (included with this course) and then consider sitting for the CompTIA IT A+ Certification exams.\u003c\/span\u003e\u003c\/div\u003e\n\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"Default\"\u003e\n\u003cb\u003e\u003cspan style=\"font-family: 'Aptos',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;\"\u003eCourse Outline \u003c\/span\u003e\u003c\/b\u003e\u003cspan style=\"color: #32458a; letter-spacing: -.3pt;\"\u003e\u003c\/span\u003e\n\u003c\/h4\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 1: Hardware\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 1 - Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.1.1 Troubleshooting Theory\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.1.2 Safety\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz  1.1:  Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 2 - Motherboards and CPUs\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.2.1 Motherboards\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing Motherboard Components\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Providing Cooling and Ventilation to the Motherboard\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.2.2 CPUs\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Identifying the CPU Socket \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing a Processor\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1.2: Motherboards and CPUs\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 3 - Computer Power Supplies\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.3.1 Power Supply Connectors\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.3.2 Power Supply Installation\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing SMPS and Connecting it to the Motherboard \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Replacing the Power Supply\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.3.3 Power Supply Troubleshooting \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1.3: Power Supplies\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 4 - Memory\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.4.1 Read-Only Memory\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.4.2 Random Access Memory Lab: Installing Memory Modules \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1.4: Memory\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 5 - Computer Expansion\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.5.1 Expansion Interfaces Lab: Identifying a PCI-Bus Slot \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing an NIC\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing Expansion Cards on a Motherboard\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.5.2 Expansion Card Installation\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing a USB 3.0 PCI Express Card (2.0 x4) \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing a PCI Sound Card\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.5.3 Connectors and Cables Quiz 1.5: Computer Expansion\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 6 - Physical Storage\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.6.1 Disk Drives\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting the Motherboard to the Internal Hard Drive \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Supplying Power to a SATA Drive\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.6.2 RAID Storage\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.6.3 Optical Drives\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing an Optical Drive and a PCI Sound Card\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.6.4 Other Storage Methods \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1.6: Physical Storage\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 7 - Input-Output Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.7.1 Input Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.7.2 Display Output Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.7.3 Display Management\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.7.4 Other Input and Output Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting Speakers to a Computer \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1.7: Input-Output Devices Quiz\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 1 Unit 8 - Printers and Multifunction Print Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.8.1 Printer Technologies\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting a USB Printer to a Computer\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.8.2 Printer Installation Maintenance \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing a Printer\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Inserting Ink Cartridges into a Printer\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.8.3 Printer Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Assembling Computer Components\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1.8: Printers and Multifunction Print Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 2: Networking\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 2 Unit 1 - Network Basics\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.1.1 Classifying Networks\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.1.2 Network Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting the Cable Modem to Access the Internet \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Identifying Clients and Servers\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing and Configuring a Temporary Server\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.1.3 Internet Connections\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting Devices in a Peer-to-Peer Architecture \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting a New Workstation to the Internet \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 2.1: Network Basics\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 2 Unit 2 - Network Cables and Connectors\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.2.1 Twisted-Pair Connections\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.2.2 Coaxial Connections\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.2.3 Optical Media\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 2.2: Network Cables and Connectors  \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 2 Unit 3 - Network Protocols\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.3.1 TCP\/IP Settings\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Configuring a Router\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.3.2 Transport Protocols\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.3.3 Application Protocols \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 2.3: Network Protocols\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 2 Unit 4 - Wireless Networking\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.4.1 Wireless Technology\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.4.2 Wi-Fi Standards\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.4.3 SOHO Router Features\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Connecting Devices in a Bus Topology \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Securing a SOHO Network\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 2.4: Wireless Networking\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 3: Virtualization and Mobile Devices\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 3 Unit 1 - Virtualization and Cloud Computing\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.1.1 Virtualization\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.1.2 Cloud Computing\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 3.1: Virtualization and Cloud Computing Quiz  \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 3 Unit 2 - Mobile Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Setting Up a VPN on Android\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Turning On the Airplane Mode of an iPhone\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.2.1 Mobile Device Types\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Removing an Account in Android \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Installing Laptop Components\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.2.2 Mobile Device Configuration\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Viewing the iOS Version of an iPhone\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.2.3 Mobile Device Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Troubleshooting Mobile Device Security Settings \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 3.2: Mobile Devices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 4: Operating Systems\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 4 Unit 1 - Operating Systems\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.1.1 Windows Versions and Features\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Identifying Different Windows Operating System Editions\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.1.2 Non-Windows Operating Systems\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Identify Different Operating Systems and Functionality \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Tools for Managing and Maintaining MAC Operating Systems\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Tools for Managing and Maintaining Linux Operating Systems\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.1.3 Installation and Upgrades\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Different Operating System Installation Methods\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.1.4 Applications and Scripting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Install and Configure Applications on a Windows Device\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Basic Scripting Techniques \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 4.1: Operating Systems\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 4 Unit 2 - Operating System Management\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.2.1 Operating System Features and Tools\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Managing a Windows Device Using the Graphical User Interface (GIU)\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.2.2 Control Panel and Settings\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Configuring a Windows Device Using the Control Panel \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Configuring and Managing a Windows Device Using\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eSettings\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.2.3 Command-Line Tools\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Managing a Windows Device Using the Command Line Interface\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.2.4 Operating System Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Troubleshooting Windows Operating Systems \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 4.2: Operating System Management\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 4 Unit 3 - Windows Networking\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.3.1 Network Shares\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.3.2 Network Connections\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Wireless Security Implementation\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.3.3 Connection Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Configuring Networking Settings on a Windows Device \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 4.3: Windows Networking\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 5: Security\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 5 Unit 1 - Security Principles\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.1.1 Threats and Vulnerabilities\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Malware and Social Engineering Prevention Methods \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Malware Removal and Remediating Best Practices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.1.2 Security Controls\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Authentication and Authorization Methods \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Remote Access Methods\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 5.1: Security Principles\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 5 Unit 2 - Security Technologies\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.2.1 Operating System Security\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Password and Account Management on a Windows Device\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Securing Web Browsers on a Windows Device\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.2.2 Security Hardware and Software \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 5.2: Security Technologies\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Implementing Physical Security Measures  \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 5 Unit 3 - Securing Devices and Data\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.3.1 Workstation Security\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Security Implementation on a Windows Device\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e5.3.2 Mobile Device Security\u003c\/span\u003e\u003cspan\u003e \u003c\/span\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Mobile Security Solutions\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.3.3 Network Security\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Implementing Network Security Measures\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.3.4 Security Troubleshooting\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Troubleshooting Personal Computer Security Settings \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 5.3: Securing Devices and Data\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 6\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 6 Unit 1 - Operational Procedures\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.1.1 IT Operations\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Documentation Best Practices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Implementing Basic Change Mgmt. Best Practices\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.1.2 Incident Response\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Privacy, Licensing and Policy Concepts\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.1.3 Backup and Recovery \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Backup and Recovery\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 6.1 Operational Procedures Quiz\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eModule 6 Unit 2 - Safety and Professionalism\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.2.1 Safety\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.2.2 Environmental Factors\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Safety and Environmental Procedures\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.2.3 Professionalism\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab: Using Proper Communication Techniques and Professionalism\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 6.2: Safety and Professionalism\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eMidterm \u0026amp; Final Exam\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eCompTIA A+ 220-1101\/220-1102 PowerPoints\u003c\/span\u003e\u003c\/div\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"MsoNormal\"\u003e\u003cbr\u003e\u003c\/h4\u003e\n\u003ch4 class=\"MsoNormal\"\u003eCourse Summary\u003c\/h4\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eVideos: 65\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eLabs: 65\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eText Lessons: 89\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eQuizzes: 22\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003ePractice Exams: 2\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003eTotal Time: Approx. 90 hours\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45044270104707,"sku":null,"price":229.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-235.png?v=1734319148"},{"product_id":"security-self-paced-training","title":"Security+ Self-Paced Training","description":"\u003cdiv\u003e\n\u003cdiv\u003e\n\u003cdiv\u003eCompTIA Security+ is recognized as the introduction to network security industry standard, and the first step into a cybersecurity career. This certification covers foundational network security skills in risk assessment and management, forensics, security controls, and more. The student’s goal will be to learn core knowledge and skills required to assess the state of security in an enterprise environment and recommend and implement security solutions. Additionally, CompTIA Security+ is a DoD approved baseline certification and is required for any DoD cybersecurity role. Those with this certification may enter the IT workforce in several different capacities, i.e. system administrator, junior penetration tester or security engineer\/analyst.\u003c\/div\u003e\n\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"Default\"\u003e\n\u003cb\u003e\u003cspan style=\"font-family: 'Aptos',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;\"\u003eCourse Outline \u003c\/span\u003e\u003c\/b\u003e\u003cspan style=\"color: #32458a; letter-spacing: -.3pt;\"\u003e\u003c\/span\u003e\n\u003c\/h4\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 1: General Security Concepts\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.1 General Security Concepts \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.2 Security Control Categories and Types \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 1\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.3 Physical Security \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e1.4 Change Movement \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 2\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 1.1: Security Concept Fundamentals \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 2: Cryptographic Solutions and Threats\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.1 Cryptography Concepts \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.2 Implementations of Cryptography \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.3 Cryptographic Tools \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 2.1: Cryptographic Solutions \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 3\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.4 Public Key Infrastructure \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.5 Threats \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 2.2: Threat Vectors and Attack Surfaces \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e2.6 Social Engineering \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 4\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 3: Vulnerabilities, Indicators of Malicious Activity, and Mitigation\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.1 Types of Vulnerabilities \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 3.1: Identifying Security Vulnerabilities \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 5\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.2 Indicators of Malicious Activity \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 3.2: Analyze Malicious Activity \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e3.3 Mitigation Techniques to Secure the Enterprise \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 6\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 4: Secure Network and Cloud Infrastructures, and Data Protection\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.1 Security Implications of Different Architecture Models \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 4.1: Security Architecture Models \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 7\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.2 Secure Enterprise Infrastructure \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 4.2: Securing Enterprise Infrastructure \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e4.3 Concepts and Strategies to Protect Data \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 4.3: Data Protection Strategies \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 8\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eMidterm Exam\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 5: Resilience and Recovery, Secure Computing Resources, and Asset Management\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.1 Importance of Resilience and Recovery in Security Architecture \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 5.1: Resilience in Security Architecture \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 9\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.2 Common Security Techniques for Computing Resources \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 5.2: Securing Computing Resources \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 10\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e5.3 Secure Asset Management \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 5.3: Asset Management Techniques \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 11\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 6: Vulnerability Management, Alerting and Monitoring, and Enhancing Enterprise Security\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.1 Activities Associated with Vulnerability Management \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 6.1: Vulnerability Management \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 12\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.2 Security Alerting and Monitoring \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 6.2: Monitoring Computer Resources \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 13\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e6.3 Modify Enterprise Capabilities to Enhance Security \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 6.3: Enhancing Enterprise Security \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 14 \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 7: Identify and Access Management, Automation and Orchestration Incident Response, and Log Data\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e7.1 Implement and Maintain Identity and Access Management (IAM)\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 7.1: Implement Identity and Access Management \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e7.2 Automation and Orchestration to Secure Operations \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 15\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 7.2: Implementation of Automation and Orchestration for Security Operations \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e7.3 Incident Response \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 7.3: Investigate Data Sources \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e7.4 Log Data \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 16\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 8: Governance and Risk Management\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e8.1 Security Governance \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 17\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e8.2 Risk Management Process \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 18\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e8.3 Third-Party Risk Assessment and Management \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eLab 8.1: Mitigation Techniques \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 19\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cstrong\u003eModule 9: Compliance, Audits and Assessments, and Security Awareness\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e9.1 Security Compliance \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 20\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e9.2 Audits and Assessments \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 21\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e9.3 Security Awareness \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"padding-left: 40px;\"\u003e\u003cspan\u003eQuiz 22\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eFinal Exam\u003c\/span\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003ch4 class=\"MsoNormal\"\u003e\u003c\/h4\u003e\n\u003ch4 class=\"MsoNormal\"\u003eCourse Summary\u003c\/h4\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eVideos: 16\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eLabs: 18\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eText Lessons: 32\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eQuizzes: 22\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003ePractice Exams: 2\u003c\/p\u003e\n\u003cp style=\"margin-bottom: 0in; line-height: normal;\" class=\"MsoNormal\"\u003eTotal Time: Approx. 47 hours, 50 minutes\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45044281966723,"sku":null,"price":229.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-234.png?v=1734320147"},{"product_id":"comptia-a-exam-voucher","title":"CompTIA A+ Exam Voucher","description":"\u003cdiv\u003e\n\u003cspan\u003e CompTIA A+ 220-1101 (Core 1) and 220-1102 (Core 2). \u003c\/span\u003e\u003cspan\u003eCandidates must complete both 1101 and 1102 to earn certification. Exams cannot be combined across the series.\u003c\/span\u003e\n\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003eCompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing. \u003c\/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cspan\u003eCompTIA A+ 220-1102 covers operating systems, security, software and operational procedures.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions: \u003c\/strong\u003e90 Questions per Exam \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003eMultiple choice questions (single and multiple response), drag and drops and performance-based \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e90 minutes per exam\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003e9 to 12 months hands-on experience in the lab or field\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45136624844931,"sku":null,"price":265.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/CompTIAA_Exam.png?v=1737958725"},{"product_id":"comptia-network-exam-voucher","title":"CompTIA Network+ Exam Voucher","description":"\u003cdiv\u003eCompTIA Network+ validates the core skills necessary to establish, maintain, troubleshoot and secure networks in any environment, preparing you for a rewarding career in networking and cybersecurity.\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cspan\u003eThe CompTIA Network+ certification verifies that the successful candidate has the knowledge and skills required to:\u003cbr\u003e\u003c\/span\u003e\n\u003cul class=\"bulletlist\"\u003e\n\u003cli\u003eEstablish network connectivity by deploying wired and wireless devices.\u003c\/li\u003e\n\u003cli\u003eUnderstand and maintain network documentation.\u003c\/li\u003e\n\u003cli\u003eUnderstand the purpose of network services.\u003c\/li\u003e\n\u003cli\u003eUnderstand basic datacenter, cloud and virtual networking concepts.\u003c\/li\u003e\n\u003cli\u003eMonitor network activity, identifying performance and availability issues.\u003c\/li\u003e\n\u003cli\u003eImplement network hardening techniques.\u003c\/li\u003e\n\u003cli\u003eManage, configure, and troubleshoot network infrastructure.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions: \u003c\/strong\u003eMaximum of 90 questions \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003eMultiple choice questions and performance-based \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e90 minutes \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003eCompTIA A+ certification and a minimum of 9-12 months of hands-on experience working in a junior network administrator\/network support technician job role.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45224867102851,"sku":null,"price":390.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-251.png?v=1742208552"},{"product_id":"comptia-security-exam-voucher","title":"CompTIA Security+ Exam Voucher","description":"\u003cdiv\u003eCompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv\u003eThe CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents. \u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions: \u003c\/strong\u003eMaximum of 90 questions \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003eMultiple choice questions and performance-based \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e90 minutes \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003eCompTIA Network+ and two years of experience working in a security\/ systems administrator job role. \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45225339158659,"sku":null,"price":425.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-250.png?v=1742223402"},{"product_id":"comptia-cloud-exam-voucher","title":"CompTIA Cloud+ Exam Voucher","description":"\u003cdiv\u003eCompTIA Cloud+ validates the essential skills to implement, maintain, optimize and troubleshoot cloud-based infrastructure services.\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cp\u003eThe CompTIA Cloud+ (CV0-004) validates that the successful candidate has the knowledge and skills required to:\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand cloud architecture and design concepts.\u003c\/li\u003e\n\u003cli\u003eImplement and maintain a secure cloud environment.\u003c\/li\u003e\n\u003cli\u003eSuccessfully provision and configure cloud resources.\u003c\/li\u003e\n\u003cli\u003eDemonstrate the ability to manage operations throughout the cloud environment life cycle using observability, scaling, and automation.\u003c\/li\u003e\n\u003cli\u003eUnderstand fundamental DevOps concepts related to deployment and integration.\u003c\/li\u003e\n\u003cli\u003eTroubleshoot common issues related to cloud management.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions: \u003c\/strong\u003eMaximum of 90 questions \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003eMultiple choice questions and performance-based \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e90 minutes \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003eAbout 5 years total IT experience, including 2-3 years as a systems administrator or cloud engineer.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45225347940483,"sku":null,"price":390.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-247.png?v=1742223594"},{"product_id":"comptia-cysa-exam-voucher","title":"CompTIA CySA+ Exam Voucher","description":"\u003cdiv\u003eCompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring.\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cp\u003eThe CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to detect and analyze indicators of malicious activity, understand threat intelligence and threat management, respond to attacks and vulnerabilities, perform incident response, and report and communicate related activity. \u003c\/p\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions:\u003c\/strong\u003e Maximum of 85 questions\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003eMultiple choice questions and performance-based \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e165 minutes \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003eNetwork+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on experience as an incident response analyst or security operations center (SOC) analyst, or equivalent experience.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45225586294915,"sku":null,"price":425.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-246.png?v=1742234928"},{"product_id":"comptia-pentest-exam-voucher","title":"CompTIA PenTest+ Exam Voucher","description":"\u003cdiv\u003eCompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and security consulting.\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cp\u003eThe CompTIA PenTest+ will certify the successful candidate has the knowledge and skills required to plan and scope a penetration testing engagement within compliance requirements, conduct enumeration and reconnaissance activities, analyze vulnerabilities, launch attacks, exfiltrate data and produce a written report with remediation techniques.  \u003c\/p\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions:\u003c\/strong\u003e Maximum of 90 questions\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003e Performance-based and Multiple choice questions\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e165 minutes \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003eNetwork+, Security+ or equivalent knowledge. 3–4 years in a penetration tester job role.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45225659498627,"sku":null,"price":425.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-245.png?v=1742238029"},{"product_id":"comptia-project-exam-voucher","title":"CompTIA Project+ Exam Voucher","description":"\u003cdiv\u003eCompTIA Project+ is the only industry certification designed to teach IT pros the entry-level skills they need to successfully manage small to medium-sized projects.\u003c\/div\u003e\n\u003cdiv\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv\u003e\n\u003cp\u003e\u003cspan\u003eCompTIA Project+ is ideal for IT professionals who need to manage smaller, less-complex projects as part of their other job duties but still have foundational project management skills. Project+ is versatile because it covers essential project management concepts beyond the scope of just one methodology or framework.\u003c\/span\u003e  \u003c\/p\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eNumber of Questions:\u003c\/strong\u003e Maximum of 90 questions\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eTypes of Questions:  \u003c\/strong\u003e Multiple choice (single and multiple response) and Performance-based questions\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eLength of Test: \u003c\/strong\u003e90 minutes \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eRecommended Experience: \u003c\/strong\u003eEquivalent to at least 6–12 months of hands-on experience managing projects in an IT environment.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003ePlease note, these exam vouchers are for use in the United States. To purchase exam vouchers for use outside of the United States, please contact our \u003ca href=\"mailto:sales@xtremelabs.io\"\u003eSales Team\u003c\/a\u003e!\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e","brand":"Trainotrack Solutions","offers":[{"title":"Default Title","offer_id":45225688989827,"sku":null,"price":390.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-249.png?v=1742238889"},{"product_id":"comptia-network-lab","title":"CompTIA Network+ Lab","description":"\u003cp\u003eThe CompTIA Network+ lab is designed to equip learners with the foundational knowledge and practical skills required to configure, manage, and troubleshoot wired and wireless networks. This lab covers essential networking concepts, technologies, and best practices, enabling individuals to design, implement, and maintain secure and reliable network infrastructure. Through hands-on labs, learners will gain practical experience in various networking tasks, preparing them for careers in network administration and IT support. This lab prepares students for exam \u003cspan style=\"font-size: 11.0pt;\"\u003eN10-009.\u003c\/span\u003e\u003cspan style=\"font-size: 11.0pt;\"\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan style=\"font-size: 11.0pt;\"\u003e\u003cem\u003e\u003cstrong\u003e\u003cspan data-teams=\"true\"\u003eThis lab is based on the Ascend Education CompTIA content. \u003c\/span\u003e\u003c\/strong\u003e\u003c\/em\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":45290925719683,"sku":null,"price":53.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/CompTIA_c6ce6041-3b5f-484d-8bf4-c7025b5d85fa.png?v=1677519581"},{"product_id":"comptia-cysa-lab","title":"CompTIA CySA+ Lab","description":"\u003cp\u003eThis course provides hands-on experience in key areas of cybersecurity operations, focusing on implementing security controls, detecting malicious activity, managing vulnerabilities, and performing incident response. Participants will develop practical skills using industry-standard tools and techniques for tasks such as log analysis, encryption, multifactor authentication, network traffic analysis, vulnerability scanning, patch management, and digital forensics. The labs are designed to align with specific exam objectives within domains such as Security Operations, Vulnerability Management, Incident Response and Management, and Reporting and Communication. Upon completion, participants will be equipped with foundational skills for maintaining secure IT environments, identifying threats, assessing risks, and responding to security incidents. This lab prepares students for exam CS0-003\u003cspan style=\"font-size: 11.0pt;\"\u003e.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003e\u003cspan style=\"font-size: 11.0pt;\"\u003e\u003cspan data-teams=\"true\"\u003eThis lab is based on the Ascend Education CompTIA content. \u003c\/span\u003e\u003c\/span\u003e\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":45330855428227,"sku":null,"price":53.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/CompTIA_c6ce6041-3b5f-484d-8bf4-c7025b5d85fa.png?v=1677519581"},{"product_id":"sc-401t00-information-security-administrator-lab","title":"SC-401T00: Protect sensitive information with Microsoft Purview in the AI Lab","description":"\u003cp\u003eThis lab includes MS Learn content which is fully integrated in the account portal and lab environment.\u003c\/p\u003e\n\u003cp\u003eThe Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats. Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.\u003c\/p\u003e\n\u003cp\u003eLabs are available in English.\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":45346262384771,"sku":null,"price":32.86,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/page-18.png?v=1681838437"},{"product_id":"comptia-a-lab-1202","title":"CompTIA A+ Lab (1202)","description":"\u003cp\u003eThis comprehensive lab is designed for aspiring IT professionals, providing a foundational understanding of various operating systems, their administration, and essential cybersecurity principles. Learners develop practical skills in installing, configuring, and maintaining Windows, macOS, and Linux systems, along with managing networks, user accounts, and security settings. The curriculum also emphasizes crucial professional skills such as troubleshooting, incident response, effective communication, and adherence to industry best practices in IT documentation, change management, and environmental responsibility. \u003cspan\u003eThis lab prepares students for exam 220-1202.\u003c\/span\u003e\u003c\/p\u003e\n\u003cdiv class=\"product-info-detailed\"\u003e\n\u003cdiv class=\"tab-content\"\u003e\n\u003cdiv role=\"tabpanel\" class=\"tab-pane active\" id=\"description\"\u003e\n\u003cp\u003e\u003cem\u003e\u003cstrong\u003e\u003cspan data-teams=\"true\"\u003eThis lab is based on the Ascend Education CompTIA content. \u003c\/span\u003e\u003c\/strong\u003e\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eLabs are available in English. \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"XtremeLabs","offers":[{"title":"Default Title","offer_id":45457012293763,"sku":null,"price":53.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/products\/CompTIA.png?v=1677519550"},{"product_id":"comptia-security-exam-sy0-701-courseware","title":"CompTIA PenTest+ (Exam: PT0-003) Courseware","description":"\u003cdiv\u003e\n\u003cp class=\"MsoNormal\"\u003eThis courseware presents a 9-module structure for a PenTest+ course aligned to the PT0-003 objectives. Each module follows the natural lifecycle of a penetration test and integrates all CompTIA learning elements.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline\u003c\/strong\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan style=\"font-size: 16.0pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; color: #f37500;\"\u003e\u003c\/span\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cdiv\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 1: Scoping and Planning a Penetration Test\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 1.0 Engagement Management\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomain Covered: 1.1 Summarize pre-engagement activities\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eScope Definition\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAgreement Types\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eTarget Selection\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAssessment Types\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eShared Responsibility Model\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eLegal and Ethical Considerations\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 2: Frameworks, Methodologies, and Communication\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 1.0 Engagement Management\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered: \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; text-indent: .5in; line-height: normal;\"\u003e\u003ci\u003e1.2 Explain collaboration and communication activities\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; text-indent: .5in; line-height: normal;\"\u003e\u003ci\u003e1.3 Compare and contrast testing frameworks and methodologies\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; text-indent: .5in; line-height: normal;\"\u003e\u003ci\u003e1.4 Explain the components of a penetration test report\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"line-height: normal; margin: 0in 0in 0in .5in;\"\u003e\u003ci\u003e1.5 Given a scenario, analyze the findings and recommend the appropriate remediation within a report.\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCollaboration and Communication\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eTesting Frameworks and Methodologies\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eThreat Modeling Frameworks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePenetration Test Report Components\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eRemediation Recommendations\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003e \u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 3: Reconnaissance Fundamentals\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 2.0 Reconnaissance and Enumeration\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered:\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e2.1 Given a scenario, apply information gathering techniques\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e2.4 Given a scenario, use the appropriate tools for reconnaissance and enumeration\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eInformation Gathering\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eReconnaissance Tools\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 4: Enumeration and Recon Scripting\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 2.0 Reconnaissance and Enumeration\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered:\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e2.2 Given a scenario, apply enumeration techniques\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e2.3 Given a scenario, modify scripts for reconnaissance and enumeration\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eEnumeration Techniques\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eReconnaissance Scripting\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 5: Vulnerability Discovery and Scanning\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 3.0 Vulnerability Discovery and Analysis\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered:\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e             \u003c\/span\u003e3.1 Given a scenario, conduct vulnerability discovery using various techniques\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"line-height: normal; margin: 0in 0in 0in .5in;\"\u003e\u003ci\u003e3.2 Given a scenario, analyze output from reconnaissance, scanning, and enumeration phases\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e            \u003c\/span\u003e3.3 Explain physical security concepts\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eScanning Techniques\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eIndustrial Control Systems (ICS) Vulnerability Assessment Tools\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eScan Output Analysis\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003ePhysical Security Concepts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 6: Attack Planning and Prioritization\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 4.0 Attacks and Exploits\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomain Covered: 4.1 Given a scenario, analyze output to prioritize and prepare attacks\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eTarget Prioritization\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCapability Selection\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 7: Network, Host, and Application Exploits\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 4.0 Attacks and Exploits\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered:\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e4.2 Given a scenario, perform network attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e4.3 Given a scenario, perform authentication attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; text-indent: .5in; line-height: normal;\"\u003e\u003ci\u003e4.4 Given a scenario, perform host-based attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; text-indent: .5in; line-height: normal;\"\u003e\u003ci\u003e4.5 Given a scenario, perform web application attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; text-indent: .5in; line-height: normal;\"\u003e\u003ci\u003e4.6 Given a scenario, perform cloud-based attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eNetwork Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAuthentication Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eHost-Based Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eWeb Application Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCloud Attacks\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 8: Wireless, Social Engineering, and Specialized Attacks\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 4.0 Attacks and Exploits\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered: \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e4.7 Given a scenario, perform wireless attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e4.8 Given a scenario, perform social engineering attacks using the appropriate tools\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e4.9 Explain common attacks against specialized systems\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e4.10 Given a scenario, use scripting to automate attacks\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eWireless Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSocial Engineering Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eSpecialized System Attacks\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eAttack Automation\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 9: Post-Exploitation, Lateral Movement, and Cleanup\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eDomain Covered: 5.0 Post-exploitation and Lateral Movement\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003eSubdomains Covered:\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e5.1 Given a scenario, perform tasks to establish and maintain persistence\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e5.2 Given a scenario, perform tasks to move laterally throughout the environment\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e5.3 Summarize concepts related to staging and exfiltration\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e5.4 Explain cleanup and restoration activities\u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003ci\u003e \u003c\/i\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cb\u003eLessons\u003c\/b\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eEstablish and Maintain Persistence\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eLateral Movement\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eStaging and Exfiltration\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003eCleanup and Restoration\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/div\u003e\n\u003cp class=\"MsoListParagraphCxSpLast\" style=\"margin-bottom: 0in; mso-add-space: auto; text-indent: -.25in; line-height: normal; mso-list: l0 level1 lfo1;\"\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45485184155779,"sku":null,"price":49.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-258.png?v=1753486890"},{"product_id":"comptia-cysa-exam-cs0-003-courseware","title":"CompTIA CySA+ (Exam: CS0-003) Courseware","description":"\u003cdiv\u003e\n\u003cp\u003eThis courseware covers the skills needed to become a cybersecurity analyst. The student will learn threat intelligence and threat hunting concepts and techniques along with the ability to identify and analyze malicious activity.\u003c\/p\u003e\n\u003cp\u003eIn addition, the student will learn incident response and vulnerability management so they can properly report and communicate to all stakeholders in an organization.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline\u003c\/strong\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan style=\"font-size: 16.0pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; color: #f37500;\"\u003e\u003c\/span\u003e\u003c\/b\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 1 Security Operations\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eThe importance of system and network architecture concepts in security operations\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eLog ingestion\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eOperating system (OS) concepts\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eInfrastructure concepts\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eNetwork architecture\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eIdentity and access management\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eEncryption\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l6 level1 lfo6; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSensitive data protection\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eAnalyze indicators of potentially malicious activity\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l1 level1 lfo12; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eNetwork activity\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l1 level1 lfo12; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eHost-related\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l1 level1 lfo12; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eApplication-related\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l1 level1 lfo12; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSocial engineering and obfuscated links \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: 1.0in; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003cspan style=\"color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 2 Threat Hunting Concepts and Tools\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eUse appropriate tools or techniques to determine malicious activity\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l11 level1 lfo13; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eTools\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l11 level1 lfo13; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCommon techniques\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l11 level1 lfo13; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eProgramming languages\/scripting\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eThreat-intelligence and threat-hunting concepts\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l13 level1 lfo3; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eThreat actors\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l13 level1 lfo3; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eTactics, techniques, and procedures (TTP) \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l13 level1 lfo3; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eConfidence levels\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l13 level1 lfo3; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCollection methods and sources\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l13 level1 lfo3; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eThreat hunting\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003e \u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 3 Process Improvement and Vulnerability Methods\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eThe importance of efficiency and process improvement in security operations\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l7 level2 lfo2; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eStandardize processes\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l7 level2 lfo2; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eStreamline operations\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l7 level2 lfo2; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eTechnology and tool integration\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l7 level2 lfo2; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSingle pane of glass\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eImplement vulnerability scanning methods and concepts\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eAsset discovery\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSpecial considerations\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eInternal vs. external scanning\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCredentialed vs. non-credentialed \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePassive vs. active \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eStatic vs. dynamic\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCritical infrastructure\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSecurity baseline scanning\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l3 level2 lfo4; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eIndustry frameworks\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003cspan style=\"color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 4 Data and Vulnerability Prioritization\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eAnalyze output from vulnerability assessment tools\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l12 level2 lfo8; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eNetwork scanning and mapping\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l12 level2 lfo8; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eWeb application scanners\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l12 level2 lfo8; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eVulnerability scanners\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l12 level2 lfo8; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eDebuggers\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l12 level2 lfo8; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eMultipurpose\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l12 level2 lfo8; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCloud infrastructure assessment tools\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cspan style=\"mso-tab-count: 1;\"\u003e              \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eAnalyze data to prioritize vulnerabilities\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l0 level2 lfo9; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCommon Vulnerability Scoring System (CVSS) interpretation\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l0 level2 lfo9; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eValidation\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l0 level2 lfo9; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eContext awareness\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l0 level2 lfo9; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eExploitability\/weaponization\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l0 level2 lfo9; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eAsset value\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l0 level2 lfo9; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eZero-day\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan style=\"font-size: 16.0pt; line-height: 107%;\"\u003e \u003c\/span\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 5 Mitigation Techniques\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eRecommend controls to mitigate attacks and software vulnerabilities\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCross-site scripting\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eOverflow vulnerabilities\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eData poisoning\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eBroken access control \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCryptographic failures \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eInjection flaws \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCross-site request forgery \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eDirectory traversal \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eInsecure design \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSecurity misconfiguration \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eEnd-of-life or outdated components \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eIdentification and authentication failures \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eServer-side request forgery \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eRemote code execution \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePrivilege escalation \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l14 level1 lfo14; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eLocal file inclusion (LFI)\/remote file inclusion (RFI)\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan style=\"font-size: 16.0pt; line-height: 107%;\"\u003e \u003c\/span\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 6 Patching and Securing Data\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eConcepts related to vulnerability response, handling, and management\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCompensating control\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eControl types\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePatching and configuration management\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eExceptions\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eRisk management principles\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePolicies, governance, and service level objectives (SLOs) \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePrioritization and escalation \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eAttack surface management\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSecure coding best practices\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eSecure software development life cycle (SDLC)\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l5 level1 lfo11; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eThreat modeling\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 7 Attacks Methods and Responses\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eAttack methodology frameworks\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l2 level1 lfo7; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCyber kill chains \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l2 level1 lfo7; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eDiamond Model of Intrusion Analysis \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l2 level1 lfo7; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eMITRE ATT\u0026amp;CK \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l2 level1 lfo7; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eOpen Source Security Testing Methodology Manual (\u003c\/span\u003eOSSTMM\u003cspan style=\"color: black;\"\u003e) \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l2 level1 lfo7; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eOWASP Testing Guide\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003ePerform incident response activities\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l8 level2 lfo5; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eDetection and analysis\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l8 level2 lfo5; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eContainment, eradication, and recovery\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003ePreparation and post-incident activity phases of the incident management life cycle\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l9 level2 lfo10; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePreparation\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l9 level2 lfo10; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003ePost-incident activity\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 8 Reporting \u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eThe importance of vulnerability management reporting\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l4 level2 lfo15; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eVulnerability management reporting\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l4 level2 lfo15; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCompliance reports\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l4 level2 lfo15; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eAction plans\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l4 level2 lfo15; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eMetrics and key performance indicators (KPIs)\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l4 level2 lfo15; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eStakeholder identification and communication\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003e\u003cb\u003eModule 9 Communication\u003c\/b\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\"\u003eThe importance of communication\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eStakeholder identification and communication \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eIncident declaration and escalation \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eIncident response reporting\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eCommunications\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eRoot cause analysis \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes; margin: 0in 0in 0in .5in;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eLessons learned \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l10 level2 lfo1; border: none; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; mso-border-shadow: yes;\"\u003e\u003c!-- [if !supportLists]--\u003e\u003cspan style=\"font-family: 'Noto Sans Symbols'; mso-fareast-font-family: 'Noto Sans Symbols'; mso-bidi-font-family: 'Noto Sans Symbols';\"\u003e\u003cspan style=\"mso-list: Ignore;\"\u003e●\u003cspan style=\"font: 7.0pt 'Times New Roman';\"\u003e        \u003c\/span\u003e\u003c\/span\u003e\u003c\/span\u003e\u003c!--[endif]--\u003e\u003cspan style=\"color: black;\"\u003eMetrics and KPIs\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp style=\"margin-bottom: 0in; mso-add-space: auto; text-indent: -.25in; line-height: normal; mso-list: l0 level1 lfo1;\" class=\"MsoListParagraphCxSpLast\"\u003e \u003c\/p\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45520112812163,"sku":null,"price":49.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/CySA.png?v=1753487617"},{"product_id":"comptia-security-exam-sy0-701-courseware-1","title":"CompTIA Security+ (Exam: SY0-701) Courseware","description":"\u003cdiv\u003e\n\u003cdiv\u003eIn this courseware, students will learn the skills and knowledge to evaluate an organization’s overall security posture and recommend suitable security solutions while maintaining adherence to applicable laws, regulations, and policies. This courseware will cover topics such as monitoring and securing mobile, enterprise network, cloud and Internet of Things (IoT) environments; threats, vulnerabilities, and their mitigation; incident response; governance, risk, and compliance; cryptography; data protection, and much more.\u003c\/div\u003e\n\u003cdiv\u003e\u003c\/div\u003e\n\u003cp\u003e\u003cstrong\u003eAudience Profile \u0026amp; Course Prerequisites\u003c\/strong\u003e\u003c\/p\u003e\n\u003cdiv\u003e\u003cspan style=\"font-size: 0.875rem;\"\u003eNeither this course, nor the Security+ exam have required prerequisites. CompTIA recommends that candidates have “A minimum of 2 years of experience in IT administration with a focus on security, hands-on experience with technical information security, and broad knowledge of security concepts”. \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cp\u003e\u003cstrong\u003eCourse Outline\u003c\/strong\u003e\u003cb style=\"mso-bidi-font-weight: normal;\"\u003e\u003cspan style=\"font-size: 16.0pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; color: #f37500;\"\u003e\u003c\/span\u003e\u003c\/b\u003e\u003cb\u003e\u003c\/b\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cdiv\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 1: General Security Concepts\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eIntroduction\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eFundamental Security Concepts\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecurity Control Categories and Types\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003ePhysical Security\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eChange Management\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e1.1 Compare and contrast various types of security controls.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e1.2 Summarize fundamental security concepts.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e1.3 Explain the importance of change management processes and the impact to security.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 2: Cryptographic Solutions and Threats\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eCryptography Concepts\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eImplementations of Cryptography\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eCryptographic Tools\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003ePublic Key Infrastructure (PKI)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eThreats\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSocial Engineering\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e1.4 Explain the importance of using appropriate cryptographic solutions.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e2.1 Compare and contrast common threat actors and motivations.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e2.2 Explain common threat vectors and attack surfaces\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: #c00000;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 3: Vulnerabilities, Indicators of Malicious Activity, and Mitigation\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eTypes of Vulnerabilities\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eIndicators of Malicious Activity\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eMitigation Techniques to Secure the Enterprise\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e2.3 Explain various types of vulnerabilities.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e2.4 Given a scenario, analyze indicators of malicious activity.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e2.5 Explain the purpose of mitigation techniques used to secure the enterprise.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 4: Secure Network and Cloud Architectures, and Data Protection\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecurity Implications of Different Architecture Models\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecure Enterprise Infrastructure\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eConcepts and Strategies to Protect Data\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e3.1 Compare and contrast security implications of different architecture models.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e3.2 Given a scenario, apply security principles to secure enterprise infrastructure.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e3.3 Compare and contrast concepts and strategies to protect data.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 5: Resilience and Recovery, Secure Computing Resources, and Asset Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eImportance of Resilience and Recovery in Security Architecture\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eCommon Security Techniques for Computing Resources\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecure Asset Management\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e3.4 Explain the importance of resilience and recovery in security architecture.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.1 Given a scenario, apply common security techniques to computing resources.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.2 Explain the security implications of proper hardware, software, and data asset management.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 6: Vulnerability Management, Alerting and Monitoring, and Enhancing Enterprise Security\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eActivities Associated with Vulnerability Management\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecurity Alerting and Monitoring\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eModify Enterprise Capabilities to Enhance Security\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-bidi-font-weight: bold;\"\u003e4.3 Explain various activities associated with vulnerability management.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.4 Explain security alerting and monitoring concepts and tools.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.5 Given a scenario, modify enterprise capabilities to enhance security.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"font-family: OpenSans-Bold; mso-bidi-font-family: OpenSans-Bold; mso-bidi-font-weight: bold;\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 7: Identity and Access Management, Automation and Orchestration, Incident Response, and Log Data\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eImplement and Maintain Identity and Access Management (IAM)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eAutomation and Orchestration to Secure Operations\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eIncident Response\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eLog Data\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.6 Given a scenario, implement and maintain identity and access management.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.7 Explain the importance of automation and orchestration related to secure operations.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.8 Explain appropriate incident response activities.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e4.9 Given a scenario, use data sources to support an investigation.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 8: Governance and Risk Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecurity Governance\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eRisk Management Process\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eThird-Party Risk Assessment and Management\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e5.1 Summarize elements of effective security governance.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e5.2 Explain elements of the risk management process.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e5.3 Explain the processes associated with third-party risk assessment and management.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cstrong\u003eChapter 9: Compliance, Audits and Assessments, and Security Awareness\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecurity Compliance\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eAudits and Assessments\u003c\/span\u003e\u003c\/li\u003e\n\u003cli class=\"MsoNormal\" style=\"line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eSecurity Awareness\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e \u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e\u003cspan style=\"mso-fareast-font-family: 'Times New Roman'; color: black;\"\u003eExam objectives covered in this chapter:\u003c\/span\u003e\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e5.4 Summarize elements of effective security compliance.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e5.5 Explain types and purposes of audits and assessments.\u003c\/p\u003e\n\u003cp class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal;\"\u003e5.6 Given a scenario, implement security awareness practices.\u003c\/p\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c!----\u003e","brand":"Ascend Education","offers":[{"title":"Default Title","offer_id":45557564801155,"sku":null,"price":49.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-259_f3aae506-b553-4b26-999e-2dc9af8c2aa0.png?v=1754603187"},{"product_id":"comptia-a-core-exam-1-220-1201-practice-test","title":"CompTIA A+ Core Exam 1 (220-1201) Practice Test","description":"\u003cp\u003eThis Practice Exam Packages is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam 220-1201. \u003c\/p\u003e\n\u003cp\u003eCandidates for the CompTIA A+ Core 1 are entry-level IT professionals with 9 to 12 months of experience in the field. CompTIA A+ 220-1201 is the first of two exams required to obtain a CompTIA A+ certification. This vendor-neutral exam covers mobile devices, networking technology, hardware, virtualization, and cloud computing and network troubleshooting.\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003e180-day access period\u003c\/li\u003e\n\u003cli\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/li\u003e\n\u003cli\u003eCustom quiz settings to drill down into specific topics\u003c\/li\u003e\n\u003cli\u003eDetailed explanations and references\u003c\/li\u003e\n\u003cli\u003eGrade as you go or simulate the exam experience\u003c\/li\u003e\n\u003cli\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/li\u003e\n\u003cli\u003eFull set of key concepts flashcards to memorize critical information\u003c\/li\u003e\n\u003cli\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/li\u003e\n\u003cli\u003eStudy Calendar to optimize your exam study time\u003c\/li\u003e\n\u003cli\u003eInstructorLink to contact our IT experts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eHardware\u003c\/li\u003e\n\u003cli\u003eNetworking\u003c\/li\u003e\n\u003cli\u003eMobile devices\u003c\/li\u003e\n\u003cli\u003eWindows operating systems\u003c\/li\u003e\n\u003cli\u003eHardware \u0026amp; network troubleshooting\u003c\/li\u003e\n\u003cli\u003eOther OS \u0026amp; technologies\u003c\/li\u003e\n\u003cli\u003eSoftware troubleshooting\u003c\/li\u003e\n\u003cli\u003eSecurity\u003c\/li\u003e\n\u003cli\u003eOperational procedures\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160219697283,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-276.png?v=1778807404"},{"product_id":"comptia-a-core-exam-2-220-1202-practice-test","title":"CompTIA A+ Core Exam 2 (220-1202) Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam 220-1202. \u003c\/p\u003e\n\u003cp\u003eCandidates for the CompTIA A+ Core 2 are entry-level IT professionals with 12 months of experience as an IT support specialist. CompTIA A+ 220-1202 is the second of two exams required to obtain a CompTIA A+ certification. This vendor-neutral exam focuses on operating systems, security, software troubleshooting, technical support, and operational procedures.\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003e180-day access period\u003c\/li\u003e\n\u003cli\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/li\u003e\n\u003cli\u003eCustom quiz settings to drill down into specific topics\u003c\/li\u003e\n\u003cli\u003eDetailed explanations and references\u003c\/li\u003e\n\u003cli\u003eGrade as you go or simulate the exam experience\u003c\/li\u003e\n\u003cli\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/li\u003e\n\u003cli\u003eFull set of key concepts flashcards to memorize critical information\u003c\/li\u003e\n\u003cli\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/li\u003e\n\u003cli\u003eStudy Calendar to optimize your exam study time\u003c\/li\u003e\n\u003cli\u003eInstructorLink to contact our IT experts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eOperating systems\u003c\/li\u003e\n\u003cli\u003eSecurity\u003c\/li\u003e\n\u003cli\u003eSoftware troubleshooting\u003c\/li\u003e\n\u003cli\u003eOperational procedures\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160243716227,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-274.png?v=1778807835"},{"product_id":"comptia-cybersecurity-analyst-cysa-cs0-003-practice-test","title":"CompTIA Cybersecurity Analyst CySA+ (CS0-003) Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam CS0-003. \u003c\/p\u003e\n\u003cp\u003eCandidates for the CompTIA Cybersecurity Analyst+ (CS0-003) are interested in how to configure and use threat detection tools, perform data analysis, and interpret the results, with the end goal of securing and protecting applications and systems. To be successful, CompTIA suggests candidates have basic knowledge of Network+, Security+, or other equivalent knowledge.\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003e180-day access period\u003c\/li\u003e\n\u003cli\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/li\u003e\n\u003cli\u003eCustom quiz settings to drill down into specific topics\u003c\/li\u003e\n\u003cli\u003eDetailed explanations and references\u003c\/li\u003e\n\u003cli\u003eGrade as you go or simulate the exam experience\u003c\/li\u003e\n\u003cli\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/li\u003e\n\u003cli\u003eFull set of key concepts flashcards to memorize critical information\u003c\/li\u003e\n\u003cli\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/li\u003e\n\u003cli\u003eStudy Calendar to optimize your exam study time\u003c\/li\u003e\n\u003cli\u003eInstructorLink to contact our IT experts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eSecurity operations and monitoring\u003c\/li\u003e\n\u003cli\u003eVulnerability management\u003c\/li\u003e\n\u003cli\u003eIncident response\u003c\/li\u003e\n\u003cli\u003eReporting and communication\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160273895555,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-284.png?v=1778808687"},{"product_id":"comptia-network-n10-009-practice-test","title":"CompTIA Network+ N10-009 Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam N10-009. \u003c\/p\u003e\n\u003cp\u003eThe CompTIA Network+ is an ideal certification for cyber professionals looking to gain a wide range of hands-on and technical skills to help become a network administrator. Network+ is approved for DoD 8140.03. The certification shows what you can do, not just what you know for the work roles of Technical Support Specialist, Network Operations Specialist and Systems Administrator.\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003e180-day access period\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eCustom quiz settings to drill down into specific topics\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eDetailed explanations and references\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eGrade as you go or simulate the exam experience\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eFull set of key concepts flashcards to memorize critical information\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eStudy Calendar to optimize your exam study time\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eContact our IT experts through the Report an Issue portal\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eNetworking Concepts\u003c\/li\u003e\n\u003cli\u003eNetwork Implementations\u003c\/li\u003e\n\u003cli\u003eNetwork Operations\u003c\/li\u003e\n\u003cli\u003eNetwork Security\u003c\/li\u003e\n\u003cli\u003eNetwork Troubleshooting\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160304042115,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-279.png?v=1778809950"},{"product_id":"comptia-pentest-pt0-003-practice-test","title":"CompTIA PenTest+ (PT0-003) Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam PT0-003. \u003c\/p\u003e\n\u003cp\u003eCandidates for the CompTIA PenTest+ certification exam are cybersecurity professionals tasked with penetration testing and vulnerability management. Candidates will be required to demonstrate hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers. CompTIA recommends that candidates have a Network+, Security+ or equivalent knowledge, along with 3-4 years of hands-on information security or related experience.\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003e180-day access period\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eCustom quiz settings to drill down into specific topics\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eDetailed explanations and references\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eGrade as you go or simulate the exam experience\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eFull set of key concepts flashcards to memorize critical information\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eStudy Calendar to optimize your exam study time\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eContact our IT experts through the Report an Issue portal\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eEngagement Management\u003c\/li\u003e\n\u003cli\u003eReconnaissance and Enumeration\u003c\/li\u003e\n\u003cli\u003eVulnerability Discovery and Analysis\u003c\/li\u003e\n\u003cli\u003eAttacks and Exploits\u003c\/li\u003e\n\u003cli\u003ePost-exploitation and Lateral Movement\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160342085763,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-280.png?v=1778810272"},{"product_id":"comptia-secai-cy0-001-practice-test","title":"CompTIA SecAI+ CY0-001 Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam CY0-001. \u003c\/p\u003e\n\u003cdiv\u003e\u003cspan\u003eDesigned to help you secure, govern, and responsibly integrate artificial intelligence into cybersecurity operations. Gain the skills to defend AI systems, meet global compliance standards, and use AI to enhance threat detection, automation, and innovation while strengthening organizational resilience.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003e\u003cbr\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan\u003eRecommended experience: 3–4 years in IT, inclusive of 2+ years hands-on cybersecurity; Security+, CySA+, PenTest+, or equivalent recommended.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003e180-day access period\u003c\/li\u003e\n\u003cli\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/li\u003e\n\u003cli\u003eCustom quiz settings to drill down into specific topics\u003c\/li\u003e\n\u003cli\u003eDetailed explanations and references\u003c\/li\u003e\n\u003cli\u003eGrade as you go or simulate the exam experience\u003c\/li\u003e\n\u003cli\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/li\u003e\n\u003cli\u003eFull set of key concepts flashcards to memorize critical information\u003c\/li\u003e\n\u003cli\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/li\u003e\n\u003cli\u003eStudy Calendar to optimize your exam study time\u003c\/li\u003e\n\u003cli\u003eInstructorLink to contact our IT experts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eBasic AI concepts related to cybersecurity\u003c\/li\u003e\n\u003cli\u003eSecuring AI systems\u003c\/li\u003e\n\u003cli\u003eAI-assisted security\u003c\/li\u003e\n\u003cli\u003eAI governance, risk, and compliance\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160366891139,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-278.png?v=1778810907"},{"product_id":"comptia-security-sy0-701-practice-test","title":"CompTIA Security+ SY0-701 Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam SY0-701. \u003c\/p\u003e\n\u003cdiv\u003e\u003cspan style=\"font-size: 0.875rem;\"\u003eCandidates for the CompTIA Security+ SY0-701 certification are recommended to have two years of experience working in a security\/ systems administrator job role and hold the CompTIA Network+ credential. The Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge and is used by organizations and security professionals around the globe.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003e180-day access period\u003c\/li\u003e\n\u003cli\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/li\u003e\n\u003cli\u003eCustom quiz settings to drill down into specific topics\u003c\/li\u003e\n\u003cli\u003eDetailed explanations and references\u003c\/li\u003e\n\u003cli\u003eGrade as you go or simulate the exam experience\u003c\/li\u003e\n\u003cli\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/li\u003e\n\u003cli\u003eFull set of key concepts flashcards to memorize critical information\u003c\/li\u003e\n\u003cli\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/li\u003e\n\u003cli\u003eStudy Calendar to optimize your exam study time\u003c\/li\u003e\n\u003cli\u003eInstructorLink to contact our IT experts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eGeneral cybersecurity concepts (12%)\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eThreats, Vulnerabilities, and Mitigations (22%)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eSecurity Architecture (18%)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eSecurity Operations (28%)\u003c\/span\u003e\u003c\/li\u003e\n\u003cli\u003e\u003cspan\u003eSecurity Program Management and Oversight (20%)\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160373674115,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-282.png?v=1778811395"},{"product_id":"comptia-securityx-formerly-casp-cas-005-practice-test","title":"CompTIA SecurityX, formerly CASP+ (CAS-005) Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam CAS-005. \u003c\/p\u003e\n\u003cdiv\u003eCandidates for the CompTIA SecurityX certification typically operate as an IT security professional and have a minimum of 10 years of experience in IT administration, including at least 5 years of hands-on technical security experience. While there is no prerequisite, the SecurityX certification is intended to follow CompTIA Security+ or equivalent experience.\u003c\/div\u003e\n\u003cdiv\u003e\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003e180-day access period\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eCustom quiz settings to drill down into specific topics\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eDetailed explanations and references\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eGrade as you go or simulate the exam experience\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eFull set of key concepts flashcards to memorize critical information\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eStudy Calendar to optimize your exam study time\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eContact our IT experts through the Report an Issue portal\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eGovernance, Risk, and Compliance\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eSecurity Architecture\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eSecurity Engineering\u003c\/span\u003e\u003c\/li\u003e\n\u003cli aria-level=\"1\"\u003e\u003cspan\u003eSecurity Operations\u003c\/span\u003e\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160397398147,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-275.png?v=1778811766"},{"product_id":"comptia-tech-fc0-u71-practice-test","title":"CompTIA Tech+ (FC0-U71) Practice Test","description":"\u003cp\u003eThis Practice Exam Package is designed to help you prepare for your next certification and perform on exam day. Study at your own pace, whenever you want, and wherever you are most comfortable. Practice with exam-like questions. This practice test prepares students for exam FC0-U71. \u003c\/p\u003e\n\u003cp\u003eThe CompTIA Tech+ certification is designed for early-career IT professionals, validating the essential skills needed for technical support and IT operations roles, including troubleshooting, networking, and security fundamentals. With no formal experience required, earning Tech+ can help candidates kick-start their IT career, stand out to employers, and build a foundation for more advanced certifications and roles.\u003cspan class=\"c-message__edited_label\" dir=\"ltr\" data-sk=\"tooltip_parent\"\u003e \u003c\/span\u003e\u003c\/p\u003e\n\u003ch4\u003ePractice Exam Package\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003e180-day access period\u003c\/li\u003e\n\u003cli\u003eMultiple unique sets of exam-like questions for additional exam experiences\u003c\/li\u003e\n\u003cli\u003eCustom quiz settings to drill down into specific topics\u003c\/li\u003e\n\u003cli\u003eDetailed explanations and references\u003c\/li\u003e\n\u003cli\u003eGrade as you go or simulate the exam experience\u003c\/li\u003e\n\u003cli\u003ePerformance Tracker to see how your performance stacks up to others\u003c\/li\u003e\n\u003cli\u003eFull set of key concepts flashcards to memorize critical information\u003c\/li\u003e\n\u003cli\u003eOnline access and downloadable and printable quizzes for offline study\u003c\/li\u003e\n\u003cli\u003eStudy Calendar to optimize your exam study time\u003c\/li\u003e\n\u003cli\u003eInstructorLink to contact our IT experts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThis exam measures the following skills*:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eIT Concepts and Terminology\u003c\/li\u003e\n\u003cli\u003eInfrastructure\u003c\/li\u003e\n\u003cli\u003eApplications and Software\u003c\/li\u003e\n\u003cli\u003eSoftware Development Concepts\u003c\/li\u003e\n\u003cli\u003eData and Database Fundamentals\u003c\/li\u003e\n\u003cli\u003eSecurity\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"N2K Networks, Inc","offers":[{"title":"Default Title","offer_id":47160407621763,"sku":null,"price":89.95,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/6083\/0083\/files\/page-287.png?v=1778812448"}],"url":"https:\/\/www.xtremelabs.io\/collections\/cybersecurity-and-compliance.oembed?page=5","provider":"XtremeLabs Marketplace","version":"1.0","type":"link"}