001 Domain 4 Introduction
002 Information System Management and Governance
003 Service Level and Operational Level Agreement
004 IT Asset Management (ITAM)
005 End User Computing and Shadow IT
006 Job Scheduling and Robotic Process Automation (RPA) overview
007 Incident Management Process
008 Forensic Investigation and dealing with Digital Evidences
009 Incident Response Training
010 Incident Response Testing
011 Problem Management
012 Security Operation Center overview
013 SOC Tools - SIEM Solution
014 SOC Tools - FIM Solution
015 SOC Tools - Vulnerability Scanners
016 Databases overview
017 Database Keys and Refrential Integrity
018 Database Management System and Normalization overview
019 What is Metadata and types of Database Metadata
020 Database Security Key Concepts
021 Database Resiliency
022 An introduction to IT Networks
023 Network Topologies Explanation
024 OSI and TCPIP Model
025 Layers 1,2,3 Overview - IP Address, MAC Address, Physical Layers
026 Layer 3,4,5,6,7 Overview - TCPUDP - Session and Application Layers
027 Understand Business Impact Assessment
028 Disaster Recovery Plan and its components
029 Business Continuity Plan
030 Considerations for BCP & DRP development and execution
031 Recovery Time Objective and Recovery Point Objective
032 Acceptable Interruption Window, Service Delivery Objective and MTO
033 Linking RPO, RTO, AIW, SDO, MTO
034 Recovery Sites
035 Reciprocal Agreement
036 Testing and evaluating the BCP and DRP
037 Data Backup Overview
038 Storage Redundancy using Redundant Array of Independent Disks
039 Data Backup types and Building your Backup Strategy