1.1 Common security principles
- 1.1.a Describe confidentiality, integrity, availability (CIA)
- 1.1.b Describe SIEM technology
- 1.1.c Identify common security terms
- 1.1.d Identify common network security zones
1.2 Common security threats
- 1.2.a Identify common network attacks
- 1.2.b Describe social engineering
- 1.2.c Identify malware
- 1.2.d Classify the vectors of data loss/exfiltration
1.3 Cryptography concepts
- 1.3.a Describe key exchange
- 1.3.b Describe hash algorithm
- 1.3.c Compare and contrast symmetric and asymmetric encryption
- 1.3.d Describe digital signatures, certificates, and PKI
1.4 Describe network topologies
- 1.4.a Campus area network (CAN)
- 1.4.b Cloud, wide area network (WAN)
- 1.4.c Data center
- 1.4.d Small office/home office (SOHO)
- 1.4.e Network security for a virtual environment