Chapter Title
Related domains:
1.0 General Security Concepts 12% 2.0 Threats, Vulnerabilities, and Mitigations 22% 3.0 Security Architecture 18% 4.0 Security Operations 28%
Related sub-domains
1.4 Explain the importance of using appropriate cryptographic solutions. 2.3 Explain various types of vulnerabilities. 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. 3.1 Compare and contrast security implications of different architecture models. 4.1 Given a scenario, apply common security techniques to computing resources. 4.2 Explain the security implications of proper hardware, software, and data asset management. 4.4 Explain security alerting and monitoring concepts and tools. 4.5 Given a scenario, modify enterprise capabilities to enhance security.
operating system vulnerabilities hardware vulnerabilities protecting endpoints sandboxing data loss prevention DLP hardening techniques embedded systems asset management
note block or deny lists are the new term for blacklists, and allows lists are the new term for whitelists in regards to applications