Module 1: General Security Concepts
1.1 General Security Concepts 
1.2 Security Control Categories and Types 
Quiz 1
1.3 Physical Security 
1.4 Change Movement 
Quiz 2
Lab 1.1: Security Concept Fundamentals 
Module 2: Cryptographic Solutions and Threats
2.1 Cryptography Concepts 
2.2 Implementations of Cryptography 
2.3 Cryptographic Tools 
Lab 2.1: Cryptographic Solutions 
Quiz 3
2.4 Public Key Infrastructure 
2.5 Threats 
Lab 2.2: Threat Vectors and Attack Surfaces 
2.6 Social Engineering 
Quiz 4
Module 3: Vulnerabilities, Indicators of Malicious Activity, and Mitigation
3.1 Types of Vulnerabilities 
Lab 3.1: Identifying Security Vulnerabilities 
Quiz 5
3.2 Indicators of Malicious Activity 
Lab 3.2: Analyze Malicious Activity 
3.3 Mitigation Techniques to Secure the Enterprise 
Quiz 6
Module 4: Secure Network and Cloud Infrastructures, and Data Protection
4.1 Security Implications of Different Architecture Models 
Lab 4.1: Security Architecture Models 
Quiz 7
4.2 Secure Enterprise Infrastructure 
Lab 4.2: Securing Enterprise Infrastructure 
4.3 Concepts and Strategies to Protect Data 
Lab 4.3: Data Protection Strategies 
Quiz 8
Midterm Exam
Module 5: Resilience and Recovery, Secure Computing Resources, and Asset Management
5.1 Importance of Resilience and Recovery in Security Architecture 
Lab 5.1: Resilience in Security Architecture 
Quiz 9
5.2 Common Security Techniques for Computing Resources 
Lab 5.2: Securing Computing Resources 
Quiz 10
5.3 Secure Asset Management 
Lab 5.3: Asset Management Techniques 
Quiz 11
Module 6: Vulnerability Management, Alerting and Monitoring, and Enhancing Enterprise Security
6.1 Activities Associated with Vulnerability Management 
Lab 6.1: Vulnerability Management 
Quiz 12
6.2 Security Alerting and Monitoring 
Lab 6.2: Monitoring Computer Resources 
Quiz 13
6.3 Modify Enterprise Capabilities to Enhance Security 
Lab 6.3: Enhancing Enterprise Security 
Quiz 14 
Module 7: Identify and Access Management, Automation and Orchestration Incident Response, and Log Data
7.1 Implement and Maintain Identity and Access Management (IAM)
Lab 7.1: Implement Identity and Access Management 
7.2 Automation and Orchestration to Secure Operations 
Quiz 15
Lab 7.2: Implementation of Automation and Orchestration for Security Operations 
7.3 Incident Response 
Lab 7.3: Investigate Data Sources 
7.4 Log Data 
Quiz 16
Module 8: Governance and Risk Management
8.1 Security Governance 
Quiz 17
8.2 Risk Management Process 
Quiz 18
8.3 Third-Party Risk Assessment and Management 
Lab 8.1: Mitigation Techniques 
Quiz 19
Module 9: Compliance, Audits and Assessments, and Security Awareness
9.1 Security Compliance 
Quiz 20
9.2 Audits and Assessments 
Quiz 21
9.3 Security Awareness 
Quiz 22
Final Exam