1. Cryptography Concepts
2. Encryption and Steganography
3. Hashing
4. Secure Protocols
5. Symmetric vs. Asymmetric Encryption
6. PKI Concepts
7. Certificates
8. Keys
9. IPSec
10. Authentication and Authorization
11. Authentication Methods
12. Additional Authentication Methods
13. Biometrics
14. Authentication Protocols - PAP and CHAP
15. Authentication Protocols - EAP and 802.1X
16. Authentication Protocols - RADIUS and TACACS
17. Authentication Protocols - Kerberos
18. Access Control Schemes
19. Account Management - Account Types
20. Account Management - Password Policies
21. Account Management - Account Policies
22. Application Security
23. Physical Security
24. Wireless Security
25. Secure Data Destruction
26. Host Security - Endpoint Protection
27. Host Security - Hardening
28. Mobile Device Deployment
29. Mobile Device Management and Enforcement
30. Mobile Device Connections
31. Specialized Systems
32. Network Security - Segmentation
33. Network Security - VPNs
34. Network Security - Proxies and Load Balancing
35. Network Security - Port Security
36. Network Security - Firewalls
37. Network Security - NIDS and NIPS
38. Virtualization
39. Cloud Concepts
40. Cloud Services
41. Cloud Models
42. Computing Types
43. Cloud Security Controls
44. Hardware Redundancy
45. Site Redundancy
46. Non-persistence Concepts
47. Backup and Recovery
48. Network Reconnaissance and Discovery
49. Packet Capture and Replay
50. Vulnerability Scans
51. SIEM and SOAR Systems
52. Pentesting Techniques
53. Pentesting Exercise Types
54. Digital Forensics Concepts
55. Investigational Data Sources
56. Incident Response Process
57. Incident Response Plans
58. Attack Frameworks
59. Security Controls
60. Regulations, Standards and Frameworks
61. Spotlight on General Data Protection Regulation
62. Organizational Security Policies - Personnel
63. Organizational Security Policies - 3rd Party Risk
64. Organizational Security Policies - Data
65. Organizational Security Policies - Other Areas
66. Risk Management Concepts - Vocabulary
67. Risk Management Concepts - Types & Strategies
68. Risk Management Concepts - Risk Analysis
69. Risk Management Concepts Business Impact Analysis
70. Privacy and Data Sensitivity Breaches & Data Types
71. Privacy, Data Sensitivity - Privacy Enhancing Tech
72. Privacy, Data Sensitivity, Roles, Responsibilities
73. Privacy and Data Sensitivity - Other Areas