<h1><span>Security Concepts</span></h1><ul><li><span>Information security</span></li><li><ul><li><span>CIA triad</span></li></ul></li><li><span>Cybersecurity framework</span></li><li><span>Gap analysis</span></li><li><span>Access control</span></li><li><ul><li><span>IAM and AAA</span></li></ul></li></ul><h1><span>Security Controls</span></h1><ul><li><span>Security control categories</span></li><li><ul><li><span>Managerial, operational, technical, physical</span></li></ul></li><li><span>Security control functional types</span></li><li><ul><li><span>Preventive, detective, corrective plus directive, deterrent, compensating</span></li></ul></li><li><span>Information security roles and responsibilities</span></li><li><span>Information security competencies</span></li><li><span>Information security business units</span></li><li><ul><li><span>SOC, DevSecOps, and CIRT</span></li></ul></li></ul><h1><span>Threat Actors</span></h1><ul><li><span>Vulnerability, threat, and risk</span></li><li><span>Attributes of threat actors</span></li><li><ul><li><span>Internal/external, level of sophistication/capability, resources/funding</span></li></ul></li><li><span>Motivations of threat actors</span></li><li><ul><li><span>Service disruption, data exfiltration, disinformation</span></li><li><span>Chaotic, financial, political</span></li></ul></li><li><span>Hackers and hacktivists</span></li><li><span>Nation-state actors and advanced persistent threats</span></li><li><span>Organized crime and competitors</span></li><li><span>Internal threat actors</span></li></ul><h1><span>Attack Surface</span></h1><ul><li><span>Attack surface and vectors</span></li><li><span>Vulnerable software</span></li><li><span>Network vectors</span></li><li><ul><li><span>Remote versus local</span></li><li><span>Direct access, wired, remote/wireless, cloud, Bluetooth, default credentials, open ports</span></li></ul></li><li><span>Lure-based vectors</span></li><li><ul><li><span>Devices, programs, documents, images</span></li></ul></li><li><span>Message-based vectors</span></li><li><ul><li><span>Email, SMS, IM, web/social media</span></li></ul></li><li><span>Supply chain attack surface</span></li><li><ul><li><span>Design, manufacture, distribution</span></li></ul></li></ul><h1><span>Social Engineering</span></h1><ul><li><span>Social engineering</span></li><li><span>Human vectors</span></li><li><span>Impersonation and pretexting</span></li><li><span>Phishing and pharming</span></li><li><span>Typosquatting</span></li><li><span>Business email compromise</span></li></ul><h1><span>Cryptographic Algorithms</span></h1><ul><li><span>Cryptographic concepts</span></li><li><span>Symmetric encryption</span></li><li><ul><li><span>Same secret key encrypts and decrypts</span></li></ul></li><li><span>Key length</span></li><li><span>Asymmetric encryption</span></li><li><ul><li><span>Public/private key pair</span></li></ul></li><li><span>Hashing</span></li><li><ul><li><span>Non-reversible</span></li></ul></li><li><span>Digital signatures</span></li><li><ul><li><span>Sign message hash with private key and validate with public key</span></li></ul></li></ul><h1><span>Public Key Infrastructure</span></h1><ul><li><span>Certificate authorities</span></li><li><span>Digital certificates</span></li><li><span>Root of trust</span></li><li><span>Certificate signing requests</span></li><li><span>Subject name attributes</span></li><li><span>Certificate revocation</span></li><li><span>Key management</span></li><li><span>Cryptoprocessors and secure enclaves</span></li><li><span>Key escrow</span></li></ul><h1><span>Cryptographic Solutions</span></h1><ul><li><span>Encryption supporting confidentiality</span></li><li><span>Disk and file encryption</span></li><li><span>Database encryption</span></li><li><span>Transport encryption and key exchange</span></li><li><span>Perfect forward secrecy</span></li><li><span>Salting and key stretching</span></li><li><span>Blockchain</span></li><li><span>Obfuscation</span></li></ul><h1><span>Authentication</span></h1><ul><li><span>Authentication design</span></li><li><ul><li><span>Something you know/are/have</span></li></ul></li><li><span>Password concepts and password managers</span></li><li><span>Multifactor authentication</span></li><li><span>Biometric authentication</span></li><li><span>Hard authentication tokens</span></li><li><ul><li><span>Smart cards, OTP generators, FIDO U2F</span></li></ul></li><li><span>Soft authentication tokens</span></li><li><ul><li><span>Two-step verification</span></li></ul></li><li><span>Passwordless authentication</span></li></ul><h1><span>Access Management</span></h1><ul><li><span>Discretionary and mandatory access control</span></li><li><span>Role-based and attribute-based access control</span></li><li><span>Rule-based access control</span></li><li><span>Least privilege permission assignments</span></li><li><span>User account provisioning</span></li><li><ul><li><span>Identity proofing, secure credentials, asset allocation, policy/awareness training, permissions assignments</span></li></ul></li><li><span>Account attributes and access policies</span></li><li><span>Account restrictions</span></li><li><ul><li><span>Location- and time-based</span></li></ul></li><li><span>Privileged access management</span></li><li><ul><li><span>Zero standing privileges and ephemeral/vaulted credentials</span></li></ul></li></ul><h1><span>Enterprise Network Architecture</span></h1><ul><li><span>Architecture and infrastructure concepts</span></li><li><ul><li><span>Media, applications/services, data supporting workflows</span></li></ul></li><li><span>Network infrastructure</span></li><li><ul><li><span>OSI layer model</span></li></ul></li><li><span>Switching and routing infrastructure considerations</span></li><li><span>Security zones and attack surface</span></li><li><span>Port security and physical isolation</span></li><li><ul><li><span>MAC filtering, 802.1X/EAP/RADIUS</span></li></ul></li><li><span>Architecture considerations</span></li><li><ul><li><span>Cost, compute/responsiveness, scalability/ease of deployment, availability, resilience/ease of recovery, power, patch availability, risk transference</span></li></ul></li></ul><h1><span>Network Security Appliances</span></h1><ul><li><span>Device placement</span></li><li><ul><li><span>Defense in depth plus use of preventive, detective, and corrective controls</span></li></ul></li><li><span>Device attributes</span></li><li><ul><li><span>Active versus passive, inline versus TAP/monitor, fail-open versus fail-closed</span></li></ul></li><li><span>Firewalls (layer 4/7)</span></li><li><span>Proxy servers</span></li><li><span>Intrusion detection systems</span></li><li><span>Next-generation firewalls and unified threat management</span></li><li><span>Load balancers</span></li><li><span>Web application firewalls</span></li><li><span>Remote access architecture</span></li><li><ul><li><span>Tunneling, client-to-site remote access VPN, site-to-site VPN</span></li></ul></li><li><span>Transport Layer Security (TLS) tunneling</span></li><li><span>Internet Protocol Security (IPSec) tunneling</span></li><li><span>Internet Key Exchange</span></li><li><span>Remote Desktop</span></li><li><span>Secure Shell</span></li><li><span>Out-of-band management and jump servers</span></li></ul>