Module 1: Domain 1 Security and Risk Management Module 1: Introduction Lesson 1: Understand and Apply Concepts of Confidentiality, Integrity and Availability Lesson 1: Learning Objectives 1.1 Information Security Fundamentals Interactive Exercise: Security Fundamentals Lesson 1: Review Lesson 1 Flashcards Lesson 1 Quiz Lesson 1: Interactive Labs Lesson 2: Evaluate and Apply Security Governance Principles Lesson 2 Learning Objectives 2.1 Frameworks, Benchmarks, and Guidelines 2.2 Leadership Roles and Responsibilities Interactive Exercise: Governance Roles and Responsibilities Lesson 2: Review Lesson 2 Flashcards Lesson 2 Quiz Lesson 2: Interactive Labs Lesson 3: Determine Compliance Requirements Lesson 3 Learning Objectives 3.1 Regulatory and Contractual Obligations 3.2 Privacy and Data Protection Lesson 3: Review Lesson 3 Flashcards Lesson 3 Quiz Lesson 3: Interactive Labs Lesson 4: Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context Lesson 4 Learning Objectives 4.1 Cybercrime and Data Breaches 4.2 Licensing and Intellectual Property Law Lesson 4: Review Lesson 4 Flashcards Lesson 4 Quiz Lesson 4: Interactive Labs Lesson 1-4 Assessment Lesson 5: Understand, Adhere to and Promote Professional Ethics Lesson 5 Learning Objectives 5.
1 Organizational and Professional Ethics Lesson 5: Review Lesson 5 Flashcards Lesson 5 Quiz Lesson 5: Interactive Labs Lesson 6: Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines Lesson 6 Learning Objectives 6.1 Information Security Policy Lesson 6: Review Lesson 6 Flashcards Lesson 6 Quiz Lesson 6: Interactive Labs Lesson 7: Identify, Analyze, and Prioritize Business Continuity (BC) Requirements Lesson 7 Learning Objectives 7.1 Business Continuity Planning 7.2 Business Impact Analysis Interactive Exercise: Business Impact Analysis Metrics_From AR (LMS) Lesson 7: Review Lesson 7 Flashcards Lesson 7 Quiz Lesson 7: Interactive Labs Lesson 8: Contribute to and Enforce Personnel Security Policies and Procedures Lesson 8 Learning Objectives 8.1 Personnel Policies and Agreements Lesson 8: Review Lesson 8 Flashcards Lesson 8 Quiz Lesson 8: Interactive Labs Lesson 5-8 Assessment Lesson 9: Understand and Apply Risk Management Concepts Lesson 9 Learning Objectives 9.1 Risk Management Concepts 9.2 Risk Assessment Interactive Exercise: Quantitative Assessment 9.3 Countermeasure Selection Interactive Exercise: Identifying Control Categories Lesson 9: Review Lesson 9 Flashcards Lesson 9 Quiz Lesson 9: Interactive Labs Lesson 10: Understand and Apply Threat Modeling Concepts and Methodologies Lesson 10 Learning Objectives 10.
1 Threat Modeling 10.2 Attack Vectors Exercise: Threats, Vulnerabilties and Exploits Lesson 10: Review Lesson 10 Flashcards Lesson 10 Quiz Lesson 10: Interactive Labs Lesson 11: Apply Risk Management Concepts to the Supply Chain Lesson 11 Learning Objectives 11.1 Supply Chain Risk Management Lesson 11: Review Lesson 11 Flashcards Lesson 11 Quiz Lesson 11: Interactive Labs Lesson 12: Establish and Maintain a Security Awareness, Education, and Training Program Lesson 12 Learning Objectives 12.1 SETA Principles and Practices 12.2 Social Engineering Training Interactive Exercise: Social Engineering Lesson 12: Review Lesson 12 Flashcards Lesson 12 Quiz Lesson 12: Interactive Labs Lesson 9-12 Assessment Module 2: Domain 2 Asset Security Module 2: Introduction Lesson 13: Identify and Classify Information and Assets Lesson 13 Learning Objectives 13.1 Classification Frameworks Interactive Exercise: Classification Lesson 13: Review Lesson 13 Flashcards Lesson 13 Quiz Lesson 13: Interactive Labs Lesson 14: Determine and Maintain Information and Asset Ownership Lesson 14 Learning Objectives 14.1 Asset Ownership and Management Lesson 14: Review Lesson 14 Flashcards Lesson 14 Quiz Lesson 14: Interactive Labs Lesson 15: Protect Privacy Lesson 15 Learning Objectives 15.1 Privacy Principles Interactive Exercise: Privacy Principles Lesson 15: Review Lesson 15 Flashcards Lesson 15 Quiz Lesson 15: Interactive Labs Lesson 16: Ensure Appropriate Asset Retention Lesson 16 Learning Objectives 16.
1 Data Retention and Destruction Interactive Exercise: Retention and Destruction Lesson 16: Review Lesson 16 Flashcards Lesson 16 Quiz Lesson 16: Interactive Labs Lesson 17: Determine Data Security Controls Lesson 17 Learning Objectives 17.1 Data Security Standards and Selection Lesson 17: Review Lesson 17 Flashcards Lesson 17 Quiz Lesson 17: Interactive Labs Lesson 18: Establish Information and Asset Handling Requirements Lesson 18 Learning Objectives 18.1 Labeling and Handling Standards Lesson 18: Review Lesson 18 Flashcards Lesson 18 Quiz Lesson 18: Interactive Labs Lesson 13-18 Assessment Module 3: Domain 3 Security Architecture and Engineering Module 3: Introduction Lesson 19: Implement and Manage Engineering Processes Using Secure Design Principles Lesson 19 Learning Objectives 19.1 Security Design Principles Lesson 19: Review Lesson 19 Flashcards Lesson 19 Quiz Lesson 19: Interactive Labs Lesson 20: Understand the Fundamental Concepts of Security Models Lesson 20 Learning Objectives 20.1 Information Security Models Interactive Exercise: Security Models Lesson 20: Review Lesson 20 Flashcards Lesson 20 Quiz Lesson 20: Interactive Labs Lesson 21: Select Controls Based Upon Systems Security Requirements Lesson 21 Learning Objectives 21.1 Security Evaluation Models Lesson 21: Review Lesson 21 Flashcards Lesson 21 Quiz Lesson 21: Interactive Labs Lesson 22: Understand Security Capabilities of Information Systems Lesson 22 Learning Objectives 22.1 Information Systems Security Capabilities Lesson 22: Review Lesson 22 Flashcards Lesson 22 Quiz Lesson 22: Interactive Labs Lesson 19-22 Assessment Lesson 23: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements Lesson 23 Learning Objectives 23.1 Traditional Computing Environments 23.
2 Cloud Computing Interactive Exercise: Cloud Delivery Models Lesson 23: Review Lesson 23 Flashcards Lesson 23 Quiz Lesson 23: Interactive Labs Lesson 24: Assess and Mitigate Vulnerabilities in Web-based Systems Lesson 24 Learning Objectives 24.1 Web Vulnerabilities Interactive Exercise: Web Vulnerabilities Lesson 24: Review Lesson 24 Flashcards Lesson 24 Quiz Lesson 24: Interactive Labs Lesson 25: Assess and Mitigate Vulnerabilities in Mobile Systems Lesson 25 Learning Objectives 25.1 Mobile Systems Vulnerabilities Lesson 25: Review Lesson 25 Flashcards Lesson 25 Quiz Lesson 25: Interactive Labs Lesson 26: Assess and Mitigate Vulnerabilities in Embedded Systems Lesson 26 Learning Objectives 26.1 Embedded Systems Vulnerabilities Lesson 26: Review Lesson 26 Flashcards Lesson 26 Quiz Lesson 26: Interactive Labs Lesson 27: Apply Cryptography Lesson 27 Learning Objectives 27.1 Cryptographic Fundamentals 27.2 Symmetric Encryption Interactive Exercise: Encryption Ciphers 27.3 Asymmetric Encryption 27.4 Hashing and Digital Signatures Interactive Exercise: Digital Signatures 27.
5 PKI and Digital Certificates 27.6 Cryptographic Attacks and Vulnerabilities Interactive Exercise: Crypto Attacks Lesson 27: Review Lesson 27 Flashcards Lesson 27 Quiz Lesson 27: Interactive Labs Lesson 28: Apply Security Principles to Site and Facility Design Lesson 28 Learning Objectives 28.1 Physical Security Principles Lesson 28: Review Lesson 28 Flashcards Lesson 28 Quiz Lesson 28: Interactive Labs Lesson 29: Implement Site and Facility Se.