Chapter Title
Related domains:
2.0 Threats, Vulnerabilities, and Mitigations 22% 4.0 Security Operations 28% 5.0 Security Program Management and Oversight 20%
Related sub-domains
2.3 Explain various types of vulnerabilities. 2.4 Given a scenario, analyze indicators of malicious activity 4.1 Given a scenario, apply common security techniques to computing resources. 4.3 Explain various activities associated with vulnerability management. 4.7 Explain the importance of automation and orchestration related to secure operations. 5.1 Summarize elements of effective security governance.
software development lifecycle SDLC devops devsecops secure coding practices API security fuzzing injection vulnerabilities password vulnerabilities session attacks cookie stealing and manipulation unvalidated redirects insecure direct object references directory traversal attack file inclusion attack privilege escalation attack XSS Cross (X) Site-Scripting request forgery application security controls secure coding practices automation and orchestration
Survey
Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.
Questions
While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.
Read
Focus on answering the questions, come up with more as necessary.
Write
Annotate thoughts and ideas Answer qeustions
Recite
Go back over appropriate sections
Reflect
How does this currently fit with what you know? How would you teach this to someone else?