1 - COMPARING AND CONTRASTING ATTACKS
- Compare and Contrast Information Security Roles 
- Explain Threat Actor Types 
- Compare and Contrast Social Engineering Attack Types 
- Determine Malware Types 
2 - COMPARING AND CONTRASTING SECURITY CONTROLS
3 - ASSESSING SECURITY POSTURE WITH SOFTWARE TOOLS
- Explain Penetration Testing Concepts 
- Assess Security Posture with Topology Discovery Software Tools 
- Assess Security Posture with Fingerprinting and Sniffing Software Tools 
- Assess Security Posture with Vulnerability Scanning Software Tools 
4 - EXPLAINING BASIC CRYPTOGRAPHY CONCEPTS
- Compare and Contrast Basic Concepts of Cryptography 
- Explain Hashing and Symmetric Cryptographic Algorithms 
- Explain Asymmetric Cryptographic Algorithms 
5 - IMPLEMENTING A PUBLIC KEY INFRASTRUCTURE
6 - IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT CONTROLS
- Compare and Contrast Identity and Authentication Concepts 
- Install and Configure Authentication Protocols 
- Implement Multifactor Authentication 
7 - MANAGING ACCESS SERVICES AND ACCOUNTS
- Install and Configure Authorization and Directory Services 
- Implement Access Management Controls 
- Differentiate Account Management Practices 
- Implement Account Auditing and Recertification 
8 - IMPLEMENTING A SECURE NETWORK ARCHITECTURE
- Implement Secure Network Architecture Concepts 
- Install and Configure a Secure Switching Infrastructure 
- Install and Configure Network Access Control 
- Install and Configure a Secure Routing and NAT Infrastructure 
9 - INSTALLING AND CONFIGURING SECURITY APPLIANCES
- Install and Configure Firewalls and Proxies 
- Install and Configure Load Balancers 
- Install and Configure Intrusion Detection/Prevention Systems 
- Install and Configure Data Loss Prevention (DLP) Systems 
- Install and Configure Logging and SIEM Systems 
10 - INSTALLING AND CONFIGURING WIRELESS AND PHYSICAL ACCESS SECURITY
- Install and Configure a Wireless Infrastructure 
- Install and Configure Wireless Security Settings 
- Explain the Importance of Physical Security Controls 
11 - DEPLOYING SECURE HOST, MOBILE, AND EMBEDDED SYSTEMS
- Implement Secure Hardware Systems Design 
- Implement Secure Host Systems Design 
- Implement Secure Mobile Device Systems Design 
- Implement Secure Embedded Systems Design 
12 - IMPLEMENTING SECURE NETWORK ACCESS PROTOCOLS
- Implement Secure Network Operations Protocols 
- Implement Secure Remote Access Protocols 
- Implement Secure Remote Administration Protocols 
13 - IMPLEMENTING SECURE NETWORK APPLICATIONS
- Implement Secure Web Services 
- Implement Secure Communications Services 
- Summarize Secure Virtualization Infrastructure 
- Summarize Secure Cloud Services 
14 - EXPLAINING RISK MANAGEMENT AND DISASTER RECOVERY CONCEPTS
- Explain Risk Management Processes and Concepts 
- Explain Resiliency and Automation Strategies 
- Explain Disaster Recovery and Continuity of Operation Concepts 
- Summarize Basic Concepts of Forensics 
15 - SUMMARIZING SECURE APPLICATION DEVELOPMENT CONCEPTS
16 - EXPLAINING ORGANIZATIONAL SECURITY CONCEPTS
- Explain the Importance of Security Policies 
- Implement Data Security and Privacy Practices 
- Explain the Importance of Personnel Management