CC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{



¥»¤¤¤ß²{¤w¤ä´© Âà¼Æ§Ö ¥I´Ú¡C



±À¤¶ªA°È¡G½Ò°ó¿ý¼vÀH®ÉÚ»
(¦b®aÆ[¬Ý = 0%¡A¦b®ÕÆ[¬Ý = 100%)

100% ¦b®ÕÆ[¬Ý¤é´Á¤Î®É¶¡¡G
¦Û¥Ñ¿ï¾Ü¡AÂI¿ï¥H¤U¦a°ÏÆ[¬Ý¿ì¤½®É¶¡¤Î¦ì¸m

¤£­­¡G$4,480 (¦aÂI¨S¦³­­¨î)³ø¦W
©ô¨¤¡G95§é $4,256 ³ø¦W phone
¹q¸Ü¡G2332-6544
Æ[¶í¡G9§é $4,032 ³ø¦W phone
¹q¸Ü¡G3563-8425
¥_¨¤¡G9§é $4,032 ³ø¦W phone
¹q¸Ü¡G3580-1893
¨F¥Ð¡G85§é $3,808 ³ø¦W phone
¹q¸Ü¡G2151-9360
¤Ùªù¡G85§é $3,808 ³ø¦W phone
¹q¸Ü¡G3523-1560

½Ò®É¡G 30 ¤p®É

¨É¥Î®É´Á¡G 10 ¬P´Á¡C¶i«×¥Ñ±z±±¨î¡A¥i§Ö¥iºC¡C

½Ò°ó¿ý¼v¾É®v¡GFranco
¦b®Õ§K¶O¸ÕÚ»¡G­º 3 ¤p®É¡A½Ð­P¹q¥H¤W¦aÂI»P¥»¤¤¤ß¾­û¹w¬ù¡C

¥»½Òµ{´£¨Ñ¦b®Õ§K¶O­«Ú»¤Î¾É®v¸ÑµªªA°È¡C




±À¤¶ªA°È¡G½Ò°ó¿ý¼vÀH®ÉÚ»
(¦b®aÆ[¬Ý = 100%¡A¦b®ÕÆ[¬Ý = 0%)

100% ¦b®aÆ[¬Ý¤é´Á¤Î®É¶¡¡G
¨C¤Ñ 24 ¤p®É¥þ¤Ñ­Ô¤£­­¦¸¼Æ¦aÆ[¬Ý

¾Ç¶O¡G$4,480 ³ø¦W phone
¹q¸Ü¡G2332-6544

½Ò®É¡G 30 ¤p®É

¨É¥Î®É´Á¡G 10 ¬P´Á¡C¶i«×¥Ñ±z±±¨î¡A¥i§Ö¥iºC¡C

½Ò°ó¿ý¼v¾É®v¡GFranco
¦b®Õ§K¶O¸ÕÚ»¡G­º 3 ¤p®É¡A½Ð­P¹q¥H¤W¦aÂI»P¥»¤¤¤ß¾­û¹w¬ù¡C

¥»½Òµ{´£¨Ñ¾É®v¸ÑµªªA°È¡C




¸ê°T¦w¥þ¤w¦¨¬°¬ì§Þ¦æ·~¤¤³ÌÃöÁ䪺»â°ì¤§¤@¡CÀHµÛ¼Æ¾Ú¬x¬y©Mºôµ¸«Â¯Ù¤£Â_ºt¶i¡A´x´¤¸ê°T¦w¥þªº±M·~ª¾ÃÑ»P§Þ¯àÅܱo¤ñ¥H©¹¥ô¦ó®É­Ô³£¨Ó±o­«­n¡C

¬°¤FÅý±z¯à¦b¦¹±M·~»â°ì²æ¿o¦Ó¥X¡A§Ú­Ì¯S§O±À¥X¤F¥»½Òµ{¡C¥»½Òµ{¥Ñ²`¨ã¸gÅ窺±M®aºë¤ß³]­p¡A¥Øªº¬O¬°¤F½T«O¾Ç­û¯à°÷Àò±o¥þ­±¦Ó°í¹êªº¸ê°T¦w¥þ°ò¦ª¾ÃÑ¡A¨Ã¦¨¥\¦Ò¨ú±M·~»{ÃÒ¸ê®æ¡C¥»½Òµ{²[»\¤F¦Ò¸Õ¤jºõªº©Ò¦³¤º®e¡A±q¸ê¦wµ¦²¤¨î©w¡B­·ÀIµû¦ô¡A¨ì¨¾¿m§Þ¥©©MÀ³«æ¤ÏÀ³³£¥]§t¨ä¤¤¡C

µL½×±z¬O IT ±M·~¤H­û¡B´Á±æÂà´«¶]¹D¶i¤J¸ê°T¦w¥þ»â°ìªºÂ¾³õ¤H¤h¡B©Î¬O¤j¾Ç¦b¾Ç¾Ç¥Í¤ÎÀ³©¡²¦·~¥Í¡A¥»½Òµ{³£±N¬O±z²z·Qªº¿ï¾Ü¡C³z¹L¥»½Òµ{¡A±z¤£¶È¯à¶}±Ò±z¦b¸ê°T¦w¥þ»â°ìªºÂ¾·~¥Í²P¡A¥ç¦P®É¬°¥¼¨Óªº¶i¶¥»{ÃÒ¦p CISSP ³þ©w°í¹êªº°ò¦¡C

¤¤¤ßªº CC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{ (¤Jªù¯Å Cybersecurity ±M·~»{ÃÒ) ¥Ñ Franco Tsang Äw³Æ¦h®É¡Aºë¤ß½s±Æ¡C¥Ñ¤W°ó¡B·Å²ß¡B¹ê²ß¡B¦Ò¸Õ¬ã²ß¡B°µ¸ÕÃD¦Ü³Ì«á¦Ò¸Õ¡A§¡¬°§A«×¨­­q³y¡A§@¥X¦³¨t²Îªº½s±Æ¡C°È¨D¯u¥¿±ÐÃѧA¡A¤S¥O§A¦Ò¸Õ¤Î®æ¡C

½Òµ{¦WºÙ¡G CC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GCybersecurity Training Course
½Òµ{®É¼Æ¡G ¦X¦@ 30 ¤p®É (¦@ 10 °ó)
¾A¦X¤H¤h¡G ¥ô¦ó¤H¤h¡AµL¶·¸gÅç¡C
±Â½Ò»y¨¥¡G ¥H¼sªF¸Ü¬°¥D¡A»²¥H­^»y
½Òµ{µ§°O¡G ¥»¤¤¤ß¾É®v¿Ë¦Û½s¼g­^¤å¬°¥Dµ§°O¡A¦Ó³¡¥÷­^¤å¦rªþ¦³¤¤¤å¹ï·Ó¡C

1. Franco Tsang (CCIE #19772) ¿Ë¦Û±Ð±Â¡G ¥»½Òµ{¥Ñ¾Ö¦³ Triple CCIE, CISA, CISM, CRISC, CDPSE, CISSP, ITILv3 Expert, ITIL 4 Managing Professional, ITIL 4 Strategic Leader, PMP µ¥±M·~»{ÃÒªº Franco Tsang ¿Ë¦Û±Ð±Â¡C
2. Franco Tsang¿Ë¦Û½s¼gµ§°O¡G Franco ¿Ë¦Û½s¼gµ§°O¡A¥O§AµL¶·¡u¦º¾S¡v¦p¦r¨å¯ë«p¤Î¤£¾A¦X­»´äŪ®Ñ®æ½Õªº®Ñ¥»¡C
3. ´£¨Ñ¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡G ¥»¤¤¤ß¬°¾Ç­û´£¨Ñ¥R¨¬ªº¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡A¨C±ø¦Ò¸ÕÃD¥Ø§¡ªþ¦³¼Ð·Çµª®×¡C¦Ó¸ûÃø²z¸ÑªºÃD¥Ø¡A§¡·|ªþ¦³ Franco ªº¸ÑÄÀ¡C
4. ²`¤J²L¥X¡G Franco ·|¦b½Ò°ó¤W²`¤J²L¥X¦aÁ¿¸Ñ¬ÛÃö·§©À¡A°È¨D¥O¦P¾Ç²z¸Ñ©â¶HªººÞ²z·§©À¡C
5. §K¶O­«Åª¡G ¶Ç²Î½Ò°ó¾Ç­û¥i©ó½Òµ{µ²§ô«á¤T­Ó¤ë¤º§K¶O­«¬Ý½Ò°ó¿ý¼v¡C

­º¥ý¦Û¦æ«e©¹ ISC2 ºô¯¸«Ø¥ß ISC2 Account ¨Ã¥H¸Ó ISC2 Account µn¤J¡Aµn¤J«á¨Ì±q¸Óºô¯¸«ü¥Ü§¹µ½±zªº­Ó¤H¸ê®Æ (¦p©m¦W¡B¹q¸Ü¸¹½X¤Î¹q¶l¦a§}µ¥µ¥)¡C

­«­n¡G±z¥²¶·«ö·Ó¦b¦Ò¸Õ¤¤¤ß¥X¥Üªº¨­¥÷ÃÒ¤Wªº¸ê®Æ¨Ó¶ñ¼g±zªº«H®§¡C¦pªG¤£§¹¥þ¤Ç°t¡A±z±NµLªk°Ñ¥[¦Ò¸Õ¡A¥B¤£·|Àò°hÁÙ¥ô¦ó¶O¥Î¡C

´£¥æ ISC2 ªººô¤W¹q¤lªí®æ«á¡A±z±N³Q­«©w¦V¨ì Pearson VUE ºô¯¸¡A¦b¨ºùرz±N¯à°÷¦w±Æ¦b¥»¤¤¤ß¦Ò¸Õ¤Îú¥I USD$199 ¤§¦Ò¸Õ¶O¡C

¦Ò¸Õ·í¤é¨ì¹F¥»¤¤¤ß®É¥²¶·¥X¥Ü¤U¦C¨â¶µ¦³®Ä¤§¨­¥÷ÃÒ©ú¤å¥ó¡A§_«h¦Ò¥Í¤£¥i¶i¦æ¦Ò¸Õ¡A¦Ó¤wú¥I¤§¦Ò¸Õ¶O¥ç¤£·|°h¦^¡G

  1. ­»´ä¨­¥÷ÃÒ ¤Î
  2. ªþ¦³¦Ò¥Í©m¦W¤Îñ¦WªºÃÒ¥ó (¦p«H¥ÎÍü¡B­»´ä¯S°ÏÅ@·Ó¡BBNOµ¥)

¦Ò¸ÕÃD¥Ø¥Ñ¿D¬w¦Ò¸Õ¤¤¤ß¶Ç°e¨ì§A­nÀ³¦Òªº¹q¸£¡A¦Ò¸Õ®É¥H¹q¸£§@µª¡C©Ò¦³¦Ò¸ÕÃD¥Ø§¡¬°­^¤å¡A¦Ó¦Ò¸ÕÃD¥Ø®æ¦¡¬° 100 ±ø¦h¶µ¿ï¾ÜÃD¡C¦X®æ¤À¼Æ¬° 700 out of 1000 points¡C


½Òµ{¦WºÙ¡GCC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GCybersecurity Training Course

Domain 1: Security Principles

  • Understand the security concepts of information assurance
    • Confidentiality
    • Integrity
    • Availability
    • Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
    • Non-repudiation
    • Privacy
  • Understand the risk management process
    • Risk management (e.g., risk priorities, risk tolerance)
    • Risk identification, assessment and treatment
  • Understand security controls
    • Technical controls
    • Administrative controls
    • Physical controls
  • Understand (ISC)2 Code of Ethics
    • Professional code of conduct
  • Understand governance processes
    • Policies
    • Procedures
    • Standards
    • Regulations and laws


Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

  • Understand business continuity (BC)
    • Purpose
    • Importance
    • Components
  • Understand disaster recovery (DR)
    • Purpose
    • Importance
    • Components
  • Understand incident response
    • Purpose
    • Importance
    • Components


Domain 3: Access Controls Concepts

  • Understand physical access controls
    • Physical security controls (e.g., badge systems, gate entry, environmental design)
    • Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
    • Authorized versus unauthorized personnel
  • Understand logical access controls
    • Principle of least privilege
    • Segregation of duties
    • Discretionary access control (DAC)
    • Mandatory access control (MAC)
    • Role-based access control (RBAC)


Domain 4: Network Security

  • Understand computer networking
    • Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi)
    • Ports
    • Applications
  • Understand network threats and attacks
    • Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
    • Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
    • Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
  • Understand network security infrastructure
    • On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
    • Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
    • Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)

Domain 5: Security Operations

  • Understand data security
    • Encryption (e.g., symmetric, asymmetric, hashing)
    • Data handling (e.g., destruction, retention, classification, labeling)
    • Logging and monitoring security events
  • Understand system hardening
    • Configuration management (e.g., baselines, updates, patches)
  • Understand best practice security policies
    • Data handling policy
    • Password policy
    • Acceptable Use Policy (AUP)
    • Bring your own device (BYOD) policy
    • Change management policy (e.g., documentation, approval, rollback)
    • Privacy policy
  • Understand security awareness training
    • Purpose/concepts (e.g., social engineering, password protection)
    • Importance

 

The course content above may change at any time without notice in order to better reflect the content of the examination.




1 Security Principles
1.1 Understand the security concepts of information assurance
1.1.1 Confidentiality
1.1.2 Integrity
1.1.3 Availability
1.1.4 Non-repudiation
1.1.5 Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
1.1.5.1 Access Control Process
1.1.5.1.1 Identification
1.1.5.1.2 Authentication
1.1.5.1.3 Authorization
1.1.5.1.4 Accounting
1.1.5.1.5 Applying the Access Control Process in Digital Systems
1.1.5.2 Password Policies
1.1.5.2.1 Password Length
1.1.5.2.2 Password Complexity
1.1.5.2.3 Password Expiration
1.1.5.2.4 Password History
1.1.5.2.5 Password Resets
1.1.5.2.6 Password Reuse
1.1.5.2.7 Password Managers
1.1.5.3 Authentication Factors
1.1.5.3.1 Something You Know
1.1.5.3.2 Something You Are
1.1.5.3.3 Something You Have
1.1.5.3.4 Multi-Factor Authentication (MFA)
1.1.6 Privacy
1.1.6.1 Overview
1.1.6.2 Privacy Management Framework (PMF)
1.1.6.2.1 Management
1.1.6.2.2 Agreement, Notice, and Communication
1.1.6.3 Collection and Creation
1.1.6.4 Use, Retention, and Disposal
1.1.6.5 Access
1.1.6.6 Disclosure to Third Parties
1.1.6.7 Security for Privacy
1.1.6.8 Data Integrity and Quality
1.1.6.9 Monitoring and Enforcement
1.2 Understand the risk management process
1.2.1 Introduction to Risk Management
1.2.2 Risk Types
1.2.3 Risk Identification and Assessment
1.2.3.1 The Language of Risk
1.2.3.2 Ranking Risks
1.2.3.3 Risk Assessment Techniques
1.2.3.3.1 Qualitative Techniques
1.2.3.3.2 Quantitative Techniques
1.2.3.4 Risk Treatment Strategies
1.2.3.4.1 Risk Avoidance
1.2.3.4.2 Risk Transference
1.2.3.4.3 Risk Mitigation
1.2.3.4.4 Risk Acceptance
1.2.3.5 Risk Profile and Tolerance
1.3 Understand security controls
1.3.1 What is Security Control?
1.3.2 Categorizing security controls
1.3.2.1 Purpose Categories (Preventive, Detective, Recovery, etc.)
1.3.2.2 Mechanism of Action Categories (Technical, Administrative, Physical, etc.)
1.4 Understand (ISC)2 Code of Ethics
1.4.1 Corporate Ethic Codes
1.4.2 ISC2 Code of Ethics
1.4.3 Ethic Complaint Procedure
1.4.3.1 More examples about Complaints
1.5 Understand governance processes
1.5.1 Security Policies, Procedures, Standards and Guidelines
1.5.2 Laws and Regulations

2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
2.1 Understand business continuity (BC)
2.1.1 Business Continuity Planning
2.1.1.1 Business Continuity Planning (BCP)
2.1.1.1.1 Business Impact Analysis (BIA)
2.1.1.1.2 BCP in a Cloud-Centric Environment
2.1.1.1.2.1 Collaboration between cloud service providers (CSP) and customers
2.1.2 Business Continuity Controls
2.1.2.1 Business Continuity Tools and Strategies
2.1.2.2 Steps in Single Point of Failure Analysis
2.1.3 High Availability and Fault Tolerance
2.1.3.1 High Availability (HA)
2.1.3.2 Load Balancing
2.1.3.3 Fault Tolerance (FT)
2.1.3.3.1 Power Supplies
2.1.3.3.2 Storage
2.1.3.3.3 Networking Components
2.1.3.3.4 Redundancy Through Diversity
2.2 Understand disaster recovery (DR)
2.2.1 Disaster Recovery (DR) Overview
2.2.2 Disaster Recovery Metrics
2.2.2.1 Recovery Time Objective (RTO)
2.2.2.2 Recovery Point Objective (RPO)
2.2.2.3 Recovery Service Level (RSL)
2.2.2.4 Importance of Metrics:
2.2.3 Training and Awareness
2.2.3.1 Training
2.2.3.2 Awareness
2.2.4 Backups
2.2.5 Disaster Recovery Sites
2.2.5.1 Hot Sites
2.2.5.2 Cold Sites
2.2.5.3 Warm Sites
2.2.5.4 Offsite Storage
2.2.5.5 Alternate Business Processes
2.2.6 Testing Disaster Recovery Plans
2.2.6.1 Read-Throughs
2.2.6.2 Walk-Throughs
2.2.6.3 Simulations
2.2.6.4 Parallel Tests
2.2.6.5 Full Interruption Tests
2.2.6.6 Disaster Recovery Testing Strategies
2.3 Understand incident response
2.3.1 Creating An Incident Response Program
2.3.1.1 Incident Response Process
2.3.2 Importance of Planning
2.3.3 Elements of a Formalized Incident Response Plan
2.3.4 Developing the Plan
2.3.5 Building An Incident Response Team
2.3.5.1 Team Composition
2.3.5.1.1 Addressing Capacity Gaps
2.3.5.2 Training and Testing
2.3.6 Incident Communications Plan
2.3.6.1 Internal Communications
2.3.6.2 External Communications
2.3.6.3 Secure Communications
2.3.7 Incident Identification And Response

3 Domain 3: Access Controls Concepts
3.1 Understand physical access controls
3.1.1 Physical Facilities
3.1.2 Designing for Security
3.1.2.1 Crime Prevention Through Environmental Design (CPTED)
3.1.3 Visitor Management
3.1.3.1 Visitor Control Procedures
3.1.3.2 Levels of Approval
3.1.3.3 Escort Policies
3.1.3.4 Visitor Logs
3.1.3.5 Identification Badges
3.1.3.6 Surveillance and Monitoring
3.1.3.7 Conclusion
3.1.4 Physical Security Personnel
3.1.4.1 Importance of Human and Automated Guards
3.1.4.2 Security Personnel
3.1.4.3 Security Protocols
3.1.4.4 Conclusion
3.2 Understand logical access controls
3.2.1 Authorization
3.2.1.1 Principle of Least Privilege (PoLP)
3.2.1.2 Segregation of Duties / Separation of Duties / SoD
3.2.1.3 Authorization Models
3.2.1.3.1 Mandatory Access Control (MAC)
3.2.1.3.2 Discretionary Access Control (DAC)
3.2.1.3.3 Role-Based Access Control (RBAC)
3.2.1.4 Design Considerations for Access Control Systems
3.2.2 Account Types
3.2.2.1 User Accounts
3.2.2.2 Administrator Accounts
3.2.2.3 Guest Accounts
3.2.2.4 Shared/Generic Accounts
3.2.2.5 Service Accounts
3.2.3 Non-Repudiation

4 Domain 4: Network Security
4.1 Understand computer networking
4.1.1 Network Types
4.1.1.1 Local Area Networks (LANs)
4.1.1.2 Wide Area Networks (WANs)
4.1.1.3 Wi-Fi Networks
4.1.1.4 Bluetooth Networks (Personal Area Networks - PANs)
4.1.1.5 Near-Field Communication (NFC)
4.1.1.6 Key Takeaways
4.1.2 TCP/IP Networking
4.1.2.1 Introduction to TCP/IP
4.1.2.2 Internet Protocol (IP)
4.1.2.3 Transmission Control Protocol (TCP)
4.1.2.4 User Datagram Protocol (UDP)
4.1.2.5 Internet Control Message Protocol (ICMP)
4.1.2.6 OSI Model
4.1.2.6.1 Physical Layer (Layer 1)
4.1.2.6.2 Data-Link Layer (Layer 2)
4.1.2.6.3 Network Layer (Layer 3)
4.1.2.6.4 Transport Layer (Layer 4)
4.1.2.6.5 Session Layer (Layer 5)
4.1.2.6.6 Presentation Layer (Layer 6)
4.1.2.6.7 Application Layer (Layer 7)
4.1.2.7 IP Addressing
4.1.2.7.1 Overview
4.1.2.7.2 Identifying Valid IPv4 Addresses
4.1.2.8 Domain Name System (DNS)
4.1.2.9 Network Ports and Applications
4.1.2.9.1 Concept of Network Ports
4.1.2.9.2 Characteristics of Network Ports
4.1.2.9.3 Port Ranges
4.1.2.9.4 Importance in Cybersecurity
4.1.2.10 Securing Wi-Fi Networks
4.1.2.10.1 Authenticate Wi-Fi Users
4.1.2.11 Wireless Encryption
4.2 Understand network threats and attacks
4.2.1 Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
4.2.1.1 Malwares
4.2.1.1.1 Components of Malware
4.2.1.1.2 Types of Malwares
4.2.1.2 Eavesdropping Attacks
4.2.1.2.1 On-Path Attacks / Man-in-the-middle (MitM)
4.2.1.3 Denial-of-Service (DoS) Attacks
4.2.1.3.1 Basic DoS Attack
4.2.1.3.2 DDoS Attack
4.2.1.3.3 Defending Against DoS and DDoS Attacks
4.2.1.3.3.1 Blocking Technology
4.2.1.3.3.2 Cooperation
4.2.1.4 Side-Channel Attacks
4.2.1.4.1 Side-Channel Attacks
4.2.1.4.2 Timing Attacks
4.2.1.4.3 Examples of Side-Channel Attacks
4.2.1.4.4 Mitigating Side-Channel Attacks
4.2.2 Threat Identification and Prevention
4.2.2.1 Anti-Virus Software
4.2.2.1.1 Advanced Malware Protection: Endpoint Detection and Response (EDR)
4.2.2.2 Intrusion Detection and Prevention
4.2.2.2.1 Intrusion Detection
4.2.2.2.2 Intrusion Prevention
4.2.2.2.3 Environments Monitored by IDS and IPS
4.2.2.2.3.1 Host-based IDS (HIDS) and Host-based IPS (HIPS):
4.2.2.2.3.2 Network-based IDS (NIDS) and Network-based IPS (NIPS):
4.2.2.2.4 Classification Errors in IDS
4.2.2.2.4.1 True Positive (TP)
4.2.2.2.4.2 True Negative (TN)
4.2.2.2.4.3 False Positive (FP) Errors
4.2.2.2.4.4 False Negative (FN) Errors
4.2.2.2.4.5 Evaluating IDS Performance
4.2.2.2.4.6 Conclusion
4.2.2.2.5 Detection Techniques in IDS and IPS
4.2.2.2.5.1 Signature Detection
4.2.2.2.5.2 Anomaly Detection
4.2.2.2.5.3 Conclusion
4.2.2.3 Firewalls
4.2.2.3.1 Key Functions and Positions
4.2.2.3.2 Typical Border Firewall Configuration
4.2.2.3.2.1 Interface to the Internet (or Untrusted Network)
4.2.2.3.2.2 Interface to the Intranet (Internal Network)
4.2.2.3.2.3 Interface to the Screened Subnet (DMZ)
4.2.2.4 Vulnerability Scanning
4.2.2.4.1 Complexity of Technical Environments
4.2.2.4.2 Importance of Vulnerability Management Programs
4.2.2.4.3 Network Vulnerability Scanning
4.2.2.4.4 Application Scanning
4.2.2.4.5 Web Application Scanning
4.3 Understand network security infrastructure
4.3.1 Data Center Protection
4.3.1.1 Overview
4.3.1.2 Air Temperature
4.3.1.2.1 Rooftop units
4.3.1.2.2 Standards and Recommendations
4.3.1.3 Humidity
4.3.1.4 Fire
4.3.2 Network Security Zones
4.3.3 Switches, WAPs and Routers
4.3.3.1 Switches
4.3.3.2 WAPs
4.3.3.3 Routers
4.3.4 Network Segmentation
4.3.4.1 Virtual LANs (VLANs)
4.3.4.2 Microsegmentation
4.3.5 Virtual Private Networks (VPNs)
4.3.6 Network Access Control (NAC)
4.3.6.1 Authentication Protocol: 802.1x
4.3.6.2 Role-Based Access Control in NAC
4.3.6.3 Posture Checking in NAC
4.3.7 Internet Of Things (IoTs) and Embedded Systems
4.4 Cloud Computing
4.4.1 Driver for Cloud Computing
4.4.2 Cloud Deployment Models
4.4.3 Cloud Service Categories
4.4.4 Security and the Shared Responsibility Model
4.4.5 Automation and Orchestration
4.4.6 Vendor Relationships
4.4.6.1 Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs)

5 Security Operations
5.1 Understand data security
5.1.1 Cryptography
5.1.1.1 Encryption Algorithms
5.1.1.1.1 Symmetric algorithms
5.1.1.1.2 Asymmetric algorithms
5.1.1.2 Uses of Encryption
5.1.1.3 Hash Functions
5.1.2 Data handling (e.g., destruction, retention, classification, labeling)
5.1.2.1 Data Life Cycle
5.1.2.1.1 Destroying Electronic Records
5.1.2.2 Destroying Paper Records
5.1.2.3 Data Classification
5.1.3 Logging and monitoring security events
5.1.3.1 Logging
5.1.3.1.1 Purpose and Objectives
5.1.3.1.2 Log Monitoring
5.2 Understand System Hardening
5.2.1 Configuration Management
5.2.2 Configuration Vulnerabilities
5.3 Understand best practice security policies
5.3.1 Acceptable Use Policy (AUP)
5.3.2 Data Handling Policy
5.3.3 Bring Your Own Device (BYOD) Policy
5.3.4 Privacy Policy
5.3.5 Change Management Policy
5.3.6 Exam Tip of this topic
5.4 Understand security awareness training
5.4.1 Social Engineering
5.4.2 Security Education

6 Miscellaneous Topics
6.1 Memorandum of Understanding (MOU)
6.2 Memorandum of Agreement (MOA)
6.3 Service-level agreement (SLA)
6.4 More about digital signature
6.5 Network Sniffing Tools
6.6 Wi-Fi Standards


¦^¨ì³»ºÝ keyboard_arrow_up