Chapter Title
Related domains:
1.0 General Security Concepts 12% 2.0 Threats, Vulnerabilities, and Mitigations 22% 4.0 Security Operations 28%
Related sub-domains
1.2 Summarize fundamental security concepts. 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. 4.6 Given a scenario, implement and maintain identity and access management.
attributes traits Identity and Access Management IAM claims to identity Extensible Authentication Protocol EAP Challenge Handshake Authentication Protocol CHAP 802.1X Remote Dial-In User Service RADIUS Terminal Access Controller Access Control System Plus TACACS+ Kerberos Single Sign-On SSO Identity Provider IdP federation attestation Relying Party RP password guidelines Multi-Factor Authentication MFA accounts account provisioning account deprovisioning Privileged Access Management PAM access control scheme filesystem permissions
Survey
Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.
Questions
While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.
Read
Focus on answering the questions, come up with more as necessary.
Write
Annotate thoughts and ideas Answer qeustions
Recite
Go back over appropriate sections
Reflect
How does this currently fit with what you know? How would you teach this to someone else?