Unit 1: Access Control in a Corporate Context
What will you learn in this unit?
- Explain the components that allow a user to be authorized on a network
- Understand access control models and their uses
- Recommend policies to protect against third-party vulnerabilities
- Discuss the 2019 Capital One data breach
Unit 2: Authentication at Work
What will you learn in this unit?
- Explain authentication factors
- Understand how biometrics are used as authentication factors
- Identify protocols used in network-level authentication
- Consider the use of single sign-on (SSO) and the implementation of authentication on switches and routers
- Think about a perfect protocol scenario
Unit 3: Scenarios: Testing and Troubleshooting
What will you learn in this unit?
- Explain the need for continuous monitoring
- Understand the basics of digital forensics
- Describe the vulnerability scan process
- Consider the penetration testing process
- Plan possible post-scan actions
Unit 4: Response and Recovery Planning
What will you learn in this unit?
- Identify the difference between incident response and disaster recovery plans
- Understand the NIST 800-61 incident response framework
- Identify the steps in the Cyber Kill Chain®, MITRE ATT&CK, and Diamond model frameworks
- Respond to a mock security incident
- Conduct a post-incident analysis
Unit 5: Security Awareness and Training
What will you learn in this unit?
- Identify security awareness training frameworks
- Explain various data classification categories
- List examples of good workplace security habits
- Consider positive security habits for Sys Admins
- Understand hands-on learning opportunities in cybersecurity
Unit 6: Ethical Concerns in Cybersecurity
What will you learn in this unit?
- Identify different types of computer crimes and their consequences
- Explain different types of copyright issues in the digital era
- Understand how to handle data ethically
- Consider data laws that are in place in the United States
- Describe best practices concerning ethical behavior on networks and in personal digital activities
Unit 7: Personal Device Security
What will you learn in this unit?
- Define different device ownership models
- Identify various security concerns related to employees bringing personal devices to work
- Explain the purpose of mobile device management (MDM) platforms
- List various MDM polices that can be enforced
- Understand how Cisco Systems selected a new MDM
Unit 8: Gliders Expands
What will you learn in this unit?
- Define the cloud and discuss why an organization may use these types of platforms
- Identify different cloud platform security controls
- Consider cloud application security controls
- Understand cloud security misconfigurations