Foundations of Information Security
Risk Management
Cryptography
Network Security
Cloud Security
Incident Reports
Incident Response Lifecycle of NIST
The Golden Hour Concept
Forensic Examination of Incident Data
Security Operations Center (SOC) Tasks
Recovery Strategy
Detecting Security Threats
Cyber Threat Intelligence
Shell Scripting
Network and Web Application Firewalls
SIEM Purpose
Shell Scripting
Antivirus Applications
Types of Cyber Attacks
Tactics, Techniques, and Procedures (TTP)
SolarWinds and Colonial Pipeline Attacks
Threats and Threat Actors
Kill Chain Methodology
Self-Paced Incidents
Test Your Knowledge and Expertise
CompTIA Security+ Overview
Exam Preparation
Key Knowledge Areas
Social Engineering Techniques
Application Attacks
Network Attacks
Scenario-Based Attack Analysis
Threat Actors, Vectors, and Intelligence Sources
Penetration Testing Techniques
Security Concerns and Vulnerabilities
Security Assessment Techniques
Security Concepts in Enterprise
Secure Application Development
Security Implications of Embedded and Specialized Systems
Virtualization and Cloud Computing
Physical Security Controls
Basics of Cryptography
Secure Protocol
Secure Network Designs
Authentication and Authorization Solutions
Host or Application Security Solutions
Public Key Infrastructure
Wireless Security Settings
Types of Controls
Risk Management Processes
Regulations, Standards, and Frameworks
Data Privacy and Sensitive Data
Organizational Security Policies
Assessing Organizational Security
Data Sources for Investigation
Incident Response
Digital Forensics
Mitigation Techniques and Controls