• 1-comparing security roles and security controls:

  • 2-Explaining Threat Actors and Threat Intelligence:

  • 3-perfomaing security assessment

  • 4-Identifying Social Engineering and Malware

  • 5-Summarizing Basic Cryptographic Concepts

  • 6-Implementing Authentication Controls

  • 7-Implementing Secure Network Designs

  • 8-Implementing Network Security Appliances (network secure devices):

  • 9-Implementing Secure Network Protocols

  • 10-Implementing Host Security Solutions

  • 11-Implementing Secure Mobile Solutions

  • 12-Summarizing Secure Application Concepts

  • 13-virtulization / hypervisor / docker

  • notes