- Better understand reconnaissance tools like passive vs active information gathering, active recon, and more
- Describe the different types of phishing
- Scan and target enumeration
- Describe Network and Security concepts
- Better understand threats, attacks, and vulnerabilities
- Implement Security policies
- Auditing information systems process
- Protection of information assets
- Governance and management of IT
- Information Security Governance
- Information Risk Management and Compliance
- Information Security Program Development and Management
- Better understand corporate IT governance
- Perform IT risk assessment
- Perform risk response and reporting