Book Content
chapters • 21h48m total length
1. Designing a Secure Network Architecture
2. Integrating Software Applications into the Enterprise
3. Enterprise Data Security, Including Secure Cloud and Virtualization Solutions
4. Deploying Enterprise Authentication and Authorization Controls
5. Threat and Vulnerability Management
6. Vulnerability Assessment and Penetration Testing Methods and Tools
7. Risk Mitigation Controls
8. Implementing Incident Response and Forensics Procedures
9. Enterprise Mobility and Endpoint Security Controls
10. Security Considerations Impacting Specific Sectors and Operational Technologies
11. Implementing Cryptographic Protocols and Algorithms
12. Implementing Appropriate PKI Solutions, Cryptographic Protocols, and Algorithms for Business Needs
13. Applying Appropriate Risk Strategies
14. Compliance Frameworks, Legal Considerations, and Their Organizational Impact
15. Business Continuity and Disaster Recovery Concepts
16. Mock Exam 1
17. Mock Exam 2














