1-comparing security roles and security controls:
2-Explaining Threat Actors and Threat Intelligence:
3-perfomaing security assessment
4-Identifying Social Engineering and Malware
5-Summarizing Basic Cryptographic Concepts
6-Implementing Authentication Controls
7-Implementing Secure Network Designs
8-Implementing Network Security Appliances (network secure devices):
9-Implementing Secure Network Protocols
10-Implementing Host Security Solutions
11-Implementing Secure Mobile Solutions
12-Summarizing Secure Application Concepts
13-virtulization / hypervisor / docker
notes