5
1 review
CompTIA Security+ includes Official Labs
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Category
81
Students
enrolled
- Description
- Curriculum
CompTIA Security+ is a widely recognized certification that validates foundational cybersecurity skills and knowledge. It is ideal for IT professionals aiming to establish a career in cybersecurity or enhance their existing IT credentials.
Key Components:
-
Threats, Attacks, and Vulnerabilities:
- Understanding various types of cybersecurity threats, attacks (e.g., malware, phishing), and vulnerabilities in systems and networks.
- Implementing strategies to mitigate risks and protect against security breaches.
-
Technologies and Tools:
- Knowledge of essential cybersecurity technologies, including firewalls, encryption methods, and intrusion detection systems (IDS).
- Proficiency in using security assessment tools and techniques to evaluate system vulnerabilities.
-
Architecture and Design:
- Designing secure network architectures and implementing secure protocols (e.g., SSL/TLS).
- Understanding cloud computing security considerations and implementing secure virtualization technologies.
-
Identity and Access Management:
- Managing user identities, implementing access controls, and ensuring authentication and authorization mechanisms are secure.
- Understanding principles of least privilege and role-based access control (RBAC).
-
Risk Management:
- Identifying and assessing cybersecurity risks within an organization.
- Implementing risk mitigation strategies and maintaining security awareness among stakeholders.
-
Cryptography and PKI:
- Understanding cryptographic algorithms, techniques, and their applications in securing communications and data.
- Managing public key infrastructure (PKI) and digital certificates for secure authentication and data integrity.
Benefits of CompTIA Security+:
- Industry Recognition: Globally recognized certification that demonstrates competency in cybersecurity fundamentals.
- Career Advancement: Opens doors to various roles such as cybersecurity analyst, security consultant, and network administrator.
- Validation of Skills: Validates practical skills in securing IT infrastructure and mitigating cybersecurity risks, enhancing credibility in the field.
Applications:
- Cybersecurity Roles: Entry-level positions in cybersecurity operations, incident response, and penetration testing.
- IT Infrastructure Roles: Relevant for professionals involved in securing network infrastructure and systems administration.
- Government and Defense: Required or preferred certification for cybersecurity roles in government and defense sectors.
CompTIA Security+ certification prepares individuals to tackle cybersecurity challenges effectively, equipping them with essential skills to protect organizations from evolving cyber threats and vulnerabilities.
Lesson 1: Summarize Fundamental Security Concepts
-
1CompTIA CertMaster Learn for Security+ Exam SY0-7017 mins
-
2Using CertMaster LearnThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
3Lesson 1 Summarize Fundamental Security ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
4Topic 1A Security ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
5Information SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
6Cybersecurity FrameworkThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
7Gap AnalysisThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
8Access ControlThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
9Topic 1B Security ControlsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
10Security Control CategoriesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
11Security Control Functional TypesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
12Information Security Roles and ResponsibilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
13Information Security CompetenciesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
14Information Security Business UnitsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
15Lesson 1 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
16Lesson 1: Summarize Fundamental Security ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 2:Compare Threat Types
-
17Lesson 2: Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
18Introduction: Threat ActorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
19Vulnerability, Threat, and RiskThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
20Attributes of Threat ActorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
21Motivations of Threat ActorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
22Hackers and HacktivistsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
23Nation-State ActorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
24Organized Crime and CompetitorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
25Internal Threat ActorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
26Topic 2B Attack SurfacesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
27Attack Surface and Threat VectorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
28Vulnerable Software VectorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
29Network VectorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
30Lure-Based VectorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
31Message-Based VectorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
32Supply Chain Attack SurfaceThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
33Topic 2C Social EngineeringThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
34Human VectorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
35Impersonation and PretextingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
36Phishing and PharmingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
37TyposquattingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
38Business Email CompromiseThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
39Lesson 2 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
40Lesson 2: Compare Threat TypesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 3 Explain Cryptographic Solutions
-
41Lesson 3 Explain Cryptographic SolutionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
42Topic 3A Cryptographic AlgorithmsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
43Cryptographic ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
44Symmetric EncryptionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
45Key LengthThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
46Asymmetric EncryptionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
47HashingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
48Digital SignaturesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
49Topic 3B Public Key InfrastructureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
50Certificate AuthoritiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
51Digital CertificatesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
52Root of TrustThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
53Certificate Signing RequestsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
54Subject Name AttributesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
55Certificate RevocationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
56Key ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
57Cryptoprocessors and Secure EnclavesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
58Key EscrowThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
59Topic 3C Cryptographic SolutionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
60Encryption Supporting ConfidentialityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
61Disk and File EncryptionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
62Database EncryptionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
63Transport Encryption and Key ExchangeThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
64Perfect Forward SecrecyThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
65Salting and Key StretchingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
66BlockchainThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
67ObfuscationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
68Lesson 3 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
69Lesson 3: Explain Cryptographic SolutionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 4 Implement Identity and Access Management
-
70Lesson 4: Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
71Topic 4A AuthenticationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
72Authentication DesignThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
73Password ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
74Password ManagersThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
75Multifactor AuthenticationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
76Biometric AuthenticationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
77Hard Authentication TokensThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
78Soft Authentication TokensThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
79Passwordless AuthenticationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
80Topic 4B AuthorizationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
81Discretionary and Mandatory Access ControlThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
82Role- and Attribute-Based Access ControlThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
83Rule-Based Access ControlThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
84Least Privilege Permission AssignmentsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
85User Account ProvisioningThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
86Account Attributes and Access PoliciesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
87Account RestrictionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
88Privileged Access ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
89Topic 4C Identity ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
90Local, Network, and Remote AuthenticationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
91Directory ServicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
92Single Sign-on AuthenticationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
93Single Sign-on AuthorizationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
94FederationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
95Security Assertion Markup LanguageThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
96Open AuthorizationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
97Lesson 4 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
98Lesson 4: Implement Identity and Access ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 5 Secure Enterprise Network Architecture
-
99Lesson 5: Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
100Topic 5A Enterprise Network ArchitectureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
101Architecture and Infrastructure ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
102Network InfrastructureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
103Switching Infrastructure ConsiderationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
104Routing Infrastructure ConsiderationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
105Security ZonesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
106Attack SurfaceThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
107Port SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
108Physical IsolationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
109Architecture ConsiderationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
110Topic 5B Network Security AppliancesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
111Device PlacementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
112Device AttributesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
113FirewallsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
114Layer 4 and Layer 7 FirewallsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
115Proxy ServersThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
116Intrusion Detection SystemsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
117Next-Generation Firewalls and Unified Threat ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
118Load BalancersThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
119Web Application FirewallsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
120Topic 5C Secure CommunicationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
121Remote Access ArchitectureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
122Transport Layer Security TunnelingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
123Internet Protocol Security TunnelingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
124Internet Key ExchangeThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
125Remote DesktopThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
126Secure ShellThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
127Out-of-Band Management and Jump ServersThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
128Lesson 5 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
129Lesson 5: Secure Enterprise Network ArchitectureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 6 Secure Cloud Network Architecture
-
130Lesson 6 : Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
131Topic 6A Cloud InfrastructureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
132Cloud Deployment ModelsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
133Responsibility MatrixThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
134Centralized and Decentralized ComputingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
135Resilient Architecture ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
136Application Virtualization and Container VirtualizationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
137Cloud ArchitectureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
138Cloud Automation TechnologiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
139Software Defined NetworkingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
140Cloud Architecture FeaturesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
141Cloud Security ConsiderationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
142Topic 6B Embedded Systems and Zero Trust ArchitectureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
143Embedded SystemsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
144Industrial Control SystemsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
145Internet of ThingsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
146Deperimeterization and Zero TrustThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
147Zero Trust Security ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
148Lesson 6 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
149Lesson 6: Secure Cloud Network ArchitectureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 7 Explain Resiliency and Site Security Concepts
-
150Lesson 7 : Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
151Topic 7A Asset ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
152Asset TrackingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
153Asset Protection ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
154Data BackupsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
155Advanced Data ProtectionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
156Secure Data DestructionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
157Topic 7B Redundancy StrategiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
158Continuity of OperationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
159Capacity Planning RisksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
160High AvailabilityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
161ClusteringThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
162Power RedundancyThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
163Diversity and Defense in DepthThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
164Deception TechnologiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
165Testing ResiliencyThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
166Topic 7C Physical SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
167Physical Security ControlsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
168Site Layout, Fencing, and LightingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
169Gateways and LocksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
170Security Guards and CamerasThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
171Alarm Systems and SensorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
172Lesson 7 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
173Lesson 7: Explain Resiliency and Site Security ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 8 Explain Vulnerability Management
-
174Lesson 8 : Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
175Topic 8A Device and OS VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
176Operating System VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
177Vulnerability TypesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
178Zero-Day VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
179Misconfiguration VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
180Cryptographic VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
181Sideloading, Rooting, and JailbreakingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
182Topic 8B Application and Cloud VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
183Application VulnerabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
184EvaluationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
185Web Application AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
186Cloud-based Application AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
187Supply ChainThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
188Topic 8C Vulnerability Identification MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
189Vulnerability ScanningThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
190Threat FeedsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
191Deep and Dark WebThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
192Other Vulnerability Assessment MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
193Topic 8D Vulnerability Analysis and RemediationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
194Common Vulnerabilities and ExposuresThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
195False Positives, False Negatives, and Log ReviewThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
196Vulnerability AnalysisThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
197Vulnerability Response and RemediationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
198Lesson 8 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
199Lesson 8: Explain Vulnerability ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 9 Evaluate Network Security Capabilities
-
200Lesson 9 : Introduction & ObjectivesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
201Topic 9A Network Security BaselinesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
202Benchmarks and Secure Configuration GuidesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
203Wireless Network Installation ConsiderationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
204Wireless EncryptionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
205Wi-Fi Authentication MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
206Network Access ControlThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
207Topic 9B Network Security Capability EnhancementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
208Access Control ListsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
209Intrusion Detection and Prevention SystemsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
210IDS and IPS Detection MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
211Web FilteringThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
212Lesson 9 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
213Lesson 9: Evaluate Network Security CapabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
214Snort RulesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 10 Assess Endpoint Security Capabilities
-
215Lesson 10 Assess Endpoint Security CapabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
216Topic 10A Implement Endpoint SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
217Endpoint HardeningThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
218Endpoint ProtectionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
219Advanced Endpoint ProtectionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
220Endpoint ConfigurationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
221Hardening TechniquesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
222Hardening Specialized DevicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
223Topic 10B Mobile Device HardeningThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
224Mobile Hardening TechniquesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
225Full Device Encryption and External MediaThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
226Location ServicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
227Cellular and GPS Connection MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
228Wi-Fi and Tethering Connection MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
229Bluetooth Connection MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
230Near-Field Communications and Mobile Payment ServicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
231Lesson 10 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
232Lesson 10: Assess Endpoint Security CapabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 11 Enhance Application Security Capabilities
-
233Lesson 11 Enhance Application Security CapabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
234Topic 11A Application Protocol Security BaselinesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
235Secure ProtocolsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
236Transport Layer SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
237Secure Directory ServicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
238Simple Network Management Protocol SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
239File Transfer ServicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
240Email ServicesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
241Email SecurityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
242Email Data Loss PreventionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
243DNS FilteringThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
244Topic 11B Cloud and Web Application Security ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
245Secure Coding TechniquesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
246Application ProtectionsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
247Software SandboxingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
248Lesson 11 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
249Lesson 11: Enhance Application Security CapabilitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
250DNSSECThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 12 Explain Incident Response and Monitoring Concepts
-
251Lesson 12 Explain Incident Response and Monitoring ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
252Topic 12A Incident ResponseThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
253Incident Response ProcessesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
254PreparationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
255DetectionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
256AnalysisThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
257ContainmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
258Eradication and RecoveryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
259Lessons LearnedThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
260Testing and TrainingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
261Threat HuntingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
262Topic 12B Digital ForensicsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
263Due Process and Legal HoldThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
264AcquisitionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
265System Memory AcquisitionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
266Disk Image AcquisitionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
267PreservationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
268ReportingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
269Topic 12C Data SourcesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
270Data Sources, Dashboards, and ReportsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
271Log DataThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
272Host Operating System LogsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
273Application and Endpoint LogsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
274Network Data SourcesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
275Packet CapturesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
276MetadataThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
277Topic 12D Alerting and Monitoring ToolsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
278Security Information and Event ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
279Alerting and Monitoring ActivitiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
280Alert TuningThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
281Monitoring InfrastructureThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
282Monitoring Systems and ApplicationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
283BenchmarksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
284Lesson 12 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
285Lesson 12: Explain Incident Response and Monitoring ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 13 Analyze Indicators of Malicious Activity
-
286Lesson 13 Analyze Indicators of Malicious ActivityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
287Topic 13A Malware Attack IndicatorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
288Malware ClassificationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
289Computer VirusesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
290Computer Worms and Fileless MalwareThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
291Spyware and KeyloggersThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
292Backdoors and Remote Access TrojansThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
293RootkitsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
294Ransomware, Crypto-Malware, and Logic BombsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
295TTPs and IoCsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
296Malicious Activity IndicatorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
297Topic 13B Physical and Network Attack IndicatorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
298Physical AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
299Network AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
300Distributed Denial of Service AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
301On-Path AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
302Domain Name System AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
303Wireless AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
304Password AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
305Credential Replay AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
306Cryptographic AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
307Malicious Code IndicatorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
308Topic 13C Application Attack IndicatorsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
309Application AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
310Replay AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
311Forgery AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
312Injection AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
313Birthday AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
314Directory Traversal and Command Injection AttacksThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
315URL AnalysisThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
316Web Server LogsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
317Lesson 13 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
318Lesson 13: Analyze Indicators of Malicious ActivityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 14 Summarize Security Governance Concepts
-
319Lesson 14 Summarize Security Governance ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
320Topic 14A Policies, Standards, and ProceduresThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
321PoliciesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
322ProceduresThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
323StandardsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
324Legal EnvironmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
325Governance and AccountabilityThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
326Topic 14B Change ManagementThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
327Change Management ProgramsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
328Allowed and Blocked ChangesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
329Restarts, Dependencies, and DowntimeThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
330Documentation and Version ControlThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
331Topic 14C Automation and OrchestrationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
332Automation and ScriptingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
333Automation and Orchestration ImplementationThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
334Lesson 14 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
335Lesson 14: Summarize Security Governance ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 15 Explain Risk Management Processes
-
336Lesson 15 Explain Risk Management ProcessesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
337Topic 15A Risk Management Processes and ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
338Risk Identification and AssessmentThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
339Risk Management StrategiesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
340Risk Management ProcessesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
341Business Impact AnalysisThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
342Topic 15B Vendor Management ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
343Vendor SelectionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
344Vendor Assessment MethodsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
345Legal AgreementsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
346Topic 15C Audits and AssessmentsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
347Attestation and AssessmentsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
348Penetration TestingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
349Exercise TypesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
350Lesson 15 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
351Lesson 15: Explain Risk Management ProcessesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Lesson 16 Summarize Data Protection and Compliance Concepts
-
352Lesson 16 Summarize Data Protection and Compliance ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
353Topic 16A Data Classification and ComplianceThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
354Data TypesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
355Data ClassificationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
356Data Sovereignty and Geographical ConsiderationsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
357Privacy DataThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
358Privacy Breaches and Data BreachesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
359ComplianceThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
360Monitoring and ReportingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
361Data ProtectionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
362Data Loss PreventionThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
363Topic 16B Personnel PoliciesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
364Conduct PoliciesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
365User and Role-Based TrainingThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
366Training Topics and TechniquesThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
367Security Awareness Training LifecycleThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
368Lesson 16 SummaryThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
-
369Lesson 16: Summarize Data Protection and Compliance ConceptsThis lesson is locked because you haven't completed the previous one yet. Finish the previous lesson to unlock this one.
Related courses

Share
Course details
Duration
4 weeks
Lectures
353
Quizzes
16
Level
Intermediate
Obtained after successfully completing the course
1 year
Computer
Popular courses