1. Examining Identity and Access Management
2. Examining Wireless Security
3. Examining Operating System Security
4. Examining Firewalls and Intrusion Detection Devices
5. Examining Password Security
6. Examining Web Filtering
7. Examining the Incident Response Process and Activities
8. Examining Endpoint Detection and Response (EDR)
9. Examining Single Sign-on
10. Examining Secure Network Protocols and Services
11. Examining Automation and Scripting Uses
12. Examining Asset Management
13. Examining Privileged Identity Management
14. Examining Application Security
15. Examining Investigation Data Sources and Log Data
16. Examining Security for Mobile Devices
17. Examining Vulnerability Analysis
18. Examining Digital Forensics Activities
19. Vulnerability Response Remediation and Reporting
20. Examining Security Baselines and Hardening
21. Examining User Onboarding and Offboarding
22. Examining Email Security
23. Examining Security Monitoring and Alerting
24. Identifying Vulnerabilities