- The basics of UCCX
- Resource management
- Basics of call scripting
- Describe the Service Provider network architectures, concepts, and transport technologies
- Describe the Cisco Internetwork Operating System (Cisco IOS®) software architectures, main IOS types, and their differences
- Implement Open Shortest Path First (OSPF) in the Service Provider network
- Explain how Aruba’s wireless networking solutions meet customers’ requirements
- Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards
- Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN
- Explain how Aruba AirWave provides unified wireless and wired network management
- Describe in-band management and out-of-band management
- Complete the initial setup on ArubaOS switches
- Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
- Different types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Security and Risk Management
- Asset Security
- Security Engineering
- Identify and describe the relevant legal and regulatory requirements regarding healthcare information
- Describe security and privacy concept principles as they relate to the healthcare industry
- Identify how organizations manage information risk, and what security and privacy governance means for that information
- Architectural concepts and design requirements
- Cloud data security
- Cloud platform and infrastructure security
- Better understand Access Control
- Better understand Security Operations and Administration
- Better understand Risk Identification, Monitoring, and Analysis
- Introduction to TCP and UDP scanning
- FTP scanning of Linux OS
- SSH scanning of Linux OS
- Introduction to MITRE
- Watering hole attacks
- SSL Strip
- Better understand reconnaissance tools like passive vs active information gathering, active recon, and more
- Describe the different types of phishing
- Scan and target enumeration