37 - Domain 411 Quiz.html
38 - Domain 411 Secure Baselines Hardening
38 - Domain 412 Quiz.html
38 - Domain-4.1.1-Given-a-scenario-apply-common-security-techniques-to-computing-resources-Secure-Baselines-Hardening-Targets.pdf
39 - Domain 412 Wireless Device Mobile Solutions
39 - Domain 413 Quiz.html
39 - Domain-4.1.2-Given-a-scenario-apply-common-security-techniques-to-computing-resources-Wireless-Device-Mobile-Solutions.pdf
40 - Domain 413 Wireless Application Security
40 - Domain 421 Quiz.html
40 - Domain-4.1.3-Given-a-scenario-apply-common-security-techniques-to-computing-resources-Wireless-Security-Settings-Application-Security.pdf
41 - Domain 421 Implications of Hardware Software Data Asset Management
41 - Domain 431 Quiz.html
41 - Domain-4.2.1-Explain-the-security-implications-of-proper-hardware-software-and-data-asset-management.pdf
42 - Domain 431 Identification Methods
42 - Domain 432 Quiz.html
42 - Domain-4.3.1-Explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-Identification-Methods.pdf
43 - Domain 432 Vulnerability Management Analysis
43 - Domain 433 Quiz.html
43 - Domain-4.3.2-Explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-Analysis.pdf
44 - Domain 433 Vulnerability Management Response Remediation Reporting
44 - Domain 441 Quiz.html
45 - Domain 441 Monitoring Concepts Tools Compute Resources Activities
45 - Domain 442 Quiz.html
45 - Domain-4.4.1-Explain-security-alerting-and-monitoring-concepts-and-tools-Monitoring-Computing-Resources-Activities.pdf
46 - Domain 442 Monitoring Concepts Tools Tools
46 - Domain 451 Quiz.html
46 - Domain-4.4.2-Explain-security-alerting-and-monitoring-concepts-and-tools-Tools.pdf
47 - Domain 451 Enhance Enterprise Security Firewalls IDSIPS and Web Filtering
47 - Domain 452 Quiz.html
47 - Domain-4.5.1-Given-a-scenario-modify-enterprise-capabilities-to-enhance-security-Firewall-IDSIPS-Web-Filter.pdf
48 - Domain 452 Enhance Enterprise Security OS Security DNS Secure Email
48 - Domain 453 Quiz.html
48 - Domain-4.5.2-Given-a-scenario-modify-enterprise-capabilities-to-enhance-security-OS-Security-Secure-Protocols-Email-Security-DNS-Filtering.pdf
49 - Domain 453 Enhance Enterprise Security Enterprise Applications
49 - Domain 461 Quiz.html
49 - Domain-4.5.3-Given-a-scenario-modify-enterprise-capabilities-to-enhance-security-FIM-NAC-XDREDR-User-Behavior-Analytics.pdf
50 - Domain 461 Identity Access Management Federation SSO Attestation
50 - Domain 462 Quiz.html
50 - Domain-4.6.1-Given-a-scenario-implement-and-maintain-identity-and-access-management-Federation-SSO-Interoperability-Attestation.pdf
51 - Domain 462 Access Control Multifactor Authentication
51 - Domain 463 Quiz.html
51 - Domain-4.6.2-Given-a-scenario-implement-and-maintain-identity-and-access-management-Access-Control-MFA.pdf
52 - Domain 463 Password Concepts Privileged Access Management
52 - Domain 471 Quiz.html
52 - Domain-4.6.3-Given-a-scenario-implement-and-maintain-identity-and-access-management-Password-Concepts-PAM.pdf
53 - Domain 471 Automation and Scripting
53 - Domain 472 Quiz.html
53 - Domain-4.7.1-Explain-the-importance-of-automation-and-orchestration-related-to-secure-operations-Use-Cases-of-Automation-Scripting.pdf
54 - Domain 472 Automation Considerations
54 - Domain 481 Quiz.html
54 - Domain-4.7.2-Explain-the-importance-of-automation-and-orchestration-related-to-secure-operations-Benefits-and-Other-Considerations.pdf
55 - Domain 481 Incident Response
55 - Domain 482 Quiz.html
55 - Domain-4.8.1-Explain-appropriate-incident-response-activities-Process-Training-Testing.pdf
56 - Domain 482 Root Cause Analysis Threat Hunting Digital Forensics
56 - Domain 491 Quiz.html
56 - Domain-4.8.2-Explain-appropriate-incident-response-activities-Process-Training-Testing.pdf
57 - Domain 491 Log Data Data Sources
57 - Domain-4.9.1-Given-a-scenario-use-data-sources-to-support-an-investigation.pdf