Chapter Title

2.0 Threats, Vulnerabilities, and Mitigations 22% 4.0 Security Operations 28% 5.0 Security Program Management and Oversight 20%

2.3 Explain various types of vulnerabilities. 2.4 Given a scenario, analyze indicators of malicious activity 4.1 Given a scenario, apply common security techniques to computing resources. 4.3 Explain various activities associated with vulnerability management. 4.7 Explain the importance of automation and orchestration related to secure operations. 5.1 Summarize elements of effective security governance.

software development lifecycle SDLC devops devsecops secure coding practices API security fuzzing injection vulnerabilities password vulnerabilities session attacks cookie stealing and manipulation unvalidated redirects insecure direct object references directory traversal attack file inclusion attack privilege escalation attack XSS Cross (X) Site-Scripting request forgery application security controls secure coding practices automation and orchestration

Survey

Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.

Questions

While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.

Read

Focus on answering the questions, come up with more as necessary.

Write

Annotate thoughts and ideas Answer qeustions

Recite

Go back over appropriate sections

Reflect

How does this currently fit with what you know? How would you teach this to someone else?