- Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
- Different types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Security and Risk Management
- Asset Security
- Security Engineering
- Identify and describe the relevant legal and regulatory requirements regarding healthcare information
- Describe security and privacy concept principles as they relate to the healthcare industry
- Identify how organizations manage information risk, and what security and privacy governance means for that information
- Architectural concepts and design requirements
- Cloud data security
- Cloud platform and infrastructure security
- Better understand Access Control
- Better understand Security Operations and Administration
- Better understand Risk Identification, Monitoring, and Analysis
- Introduction to TCP and UDP scanning
- FTP scanning of Linux OS
- SSH scanning of Linux OS
- Introduction to MITRE
- Watering hole attacks
- SSL Strip
- Better understand reconnaissance tools like passive vs active information gathering, active recon, and more
- Describe the different types of phishing
- Scan and target enumeration
- Describe Network and Security concepts
- Better understand threats, attacks, and vulnerabilities
- Implement Security policies
- Auditing information systems process
- Protection of information assets
- Governance and management of IT
- Information Security Governance
- Information Risk Management and Compliance
- Information Security Program Development and Management
- Better understand corporate IT governance
- Perform IT risk assessment
- Perform risk response and reporting