2 - Security Roles and Security Controls
3 - Threat Actors and Threat Intelligence
4 - Performing Security Assessments
5 - Basic Cryptographic Concepts
6 - Social Engineering and Malware
7 - Implenting PKI
8 - Implementing Authentication Controls
9 - Identity and Account Management Controls
10 - Implementing Secure Network Designs
11 - Implementing Network Security Applicances
12 - Implementing Secure Network Protocols
13 - Implementing Host Security Solutions
14 - Implementing Secure Mobile Solutions
15 - Summarizing Secure Application Concepts
16 - Implementing Secure Cloud Solutions
17 - Explaining Data Privacy and Protection
18 - Performing Incident Response
19 - Explaining Digital Forensics
20 - Risk Management Concepts
21 - Cybersecurity Resilience
22 - Physical Security