Access Control
- Learn and implement procedures to ensure system users are aware of their responsibilities before granting access to the information systems
- Identify the criteria for mandatory and discretionary access control, understand the difference
- Learn about the factors that help in implementation of access controls and design an access control plan
- Implement and manage an access control plan in alignment with the basic principles that govern the access control systems such as need-to-know
- Identify different access control systems such as ID cards and biometrics
- Understand the importance of warning banners for implementing access rules
Social Engineering, Phishing Attacks, Identity Theft
- Larn about various social engineering concepts and their role in insider attacks and develop best practices to counter social engineering attacks
- Identify and design a plan to overcome phishing attacks
- Design and develop a response plan to identity theft incidences
Physical Security
- Identify standards, procedures, directives, policies, regulations, and laws for physical security
- Design, implement and oversees a comprehensive, coordinated, and holistic physical security plan to ensure overall organizational security including a scheduled audit and performance metrics
- Determine the value of physical assets and the impact of its unavailability
Disaster Recovery and Business Continuity Planning
- Learn the importance of integration of IA requirements into the Continuity of Operations Plan (COOP).
- Develop, implement, and monitor business continuity, business recovery, contingency planning, and disaster recovery plans in case of disruptive events and ensure alignment with organizational goals and objectives
- Direct contingency planning, operations, and programs to manage risk
- Develop a documentation process as part of the continuity of operations program
- Design and execute a testing and updating plan for the continuity of operations program
Firewall, IDS/IPS and Network Defense Systems
- Identify network vulnerabilities and explore network security controls such as use of SSL and TLS for transmission security
- Recognize and manage network cloud security
- Identify the appropriate intrusion detection and prevention systems for organizational information security
- Learn to manage accounts, network rights, and access to systems and equipment
- Design and develop a program to monitor firewalls and identify firewall configuration issues
- Learn perimeter defense systems such as grid sensors and access control lists on routers, firewalls, and other network devices
- Identify the basic network architecture, models, protocols and components such as routers and hubs that play a role in network security
- Understand the concept of network segmentation
- Manage DMZS, VPN and telecommunication technologies such as PBX and VoIP
- Support, monitor, test, and troubleshoot issues with hardware and software
Wireless Security
- Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools
Virus, Trojans and Malware, and other Malicious Code Threats
- Assess the threat of virus, Trojan and malware to organizational security and identify sources and mediums of malware infection
- Deploy and manage anti-virus systems
- Develop process to counter virus, Trojan, and malware threats including training both security teams and non-security teams on secure development processes
Secure Coding Best Practices and Securing Web Applications
- Recognize web application vulnerabilities and attacks and web application security tools to counter attacks
- Develop and maintain software assurance programs in alignment with the secure coding principles and each phase of System Development Life Cycle (SDLC)
- Learn about various system-engineering practices
- Configure and run tools that help in developing secure programs
- Understand software vulnerability analysis techniques including static code, dynamic code, and software composition analysis.
- Install and operate the IT systems in a test configuration manner that does not alter the program code or compromise security safeguards
OS Hardening
- Identify various OS vulnerabilities and attacks and develop a plan for hardening OS systems
- Learn system logs, patch management process and configuration management for information system security
Encryption Technologies
- Understand the concept of encryption and decryption, digital certificates, public key infrastructure and the key differences between cryptography and steganography
- Create a plan for information security encryption techniques
- Identify the different components of a cryptosystem
Vulnerability Assessment and Penetration Testing
- Design, develop and manage a penetration testing program based on penetration testing methodology to ensure organizational security
- Identify different vulnerabilities associated with information systems and legal issues involved in penetration testing
- Develop pre and post testing procedures
- Create a plan for pen test reporting and implementation of technical vulnerability corrections
- Develop vulnerability management systems
Threat Management
- Develop and manage a threat management program including threat intelligence, third party threats, and security bulletins regarding hardware and software, particularly open-source software
Incident Response and Computer Forensics
- Create a plan to identify a potential security violation and take appropriate action to report the incident
- Establish guidelines to assess whether a security incident constitutes a legal violation requiring specialized legal action
- Design investigation processes such as evidence collection, imaging, data acquisition, and analysis
- Understand the best practices to acquire, store and process digital evidence
- Learn, configure and use various forensic investigation tools
- Design anti-forensic techniques
- Comply with system termination procedures and incident reporting requirements related to potential security incidents or actual breaches
- Assess potential security violations to determine if the network security policies have been breached, assess the impact, and preserve evidence
- Diagnose and resolve IA problems in response to reported incidents
- Design incident response procedures including testing, tabletop exercises, and playbooks
- Set up and manage forensic labs and programs
- Gain expertise in digital media devices, e-discovery methodologies, and various file systems.
- Develop and manage an organizational digital forensic program
- Establish, develop and manage forensic investigation teams
- Identify both volatile and persistent system data and oversee the setup of forensic programs.
Application Security
- Separation of Development, Test, and Production Environments
- Application Security Testing Approaches
- Waterfall Methodology and Security
- Agile Methodology and Security
- Other Application Development Approaches
- Application Security Technologies
- Version Control and Patch Management
Virtualization Security
- Virtualization Security Concerns
- Virtualization Security Controls
- Virtualization Security Reference Model
Cloud Computing Security
- Security and Resiliency Cloud Services
- Overview of Cloud Computing
- Cloud Computing Protection Considerations
Transformative Technologies
- Software-Defined Cybersecurity