Chapter 1: Understanding threats
- Module A: Threats and vulnerabilities
- Module B: Attack strategies
Chapter 2: Proactive security
- Module A: Threat intelligence
- Module B: Attack methodology
- Module C: Active defenses
Chapter 3: Operational security
- Module A: Controls and procedures
- Module B: Automation and process improvement
Chapter 4: Vulnerability management
- Module A: Vulnerability testing
- Module B: Vulnerability management programs
- Module C: Vulnerability remediation
Chapter 5: Security testing procedures
- Module A: Vulnerability assessment tools
- Module B: Analyzing scan results
Chapter 6: Secure infrastructure
- Module A: Infrastructure comparisons
- Module B: Secure network infrastructure
- Module C: Identity systems
Chapter 7: Secure hosts and data
- Module A: Secure operating systems
- Module B: Data protection
Chapter 8: Secure software
- Module A: Application exploits
- Module B: Secure development
- Module C: Software testing
Chapter 9: Threat analysis
- Module A: Threat detection techniques
- Module B: Detection and analysis tools
Chapter 10: Incident Response
- Module A: Incident response planning
- Module B: Incident response procedures
- Module C: Digital forensics