Standards in this Framework
| Standard | Description |
|---|---|
| 1.1 | Given a scenario, analyze indicators of compromise and determine the type of malware. |
| 1.2 | Compare and contrast types of attacks. |
| 1.3 | Explain threat actor types and attributes. |
| 1.4 | Explain penetration testing concepts. |
| 1.5 | Explain vulnerability scanning concepts. |
| 1.6 | Explain the impact associated with types of vulnerabilities. |
| 2.1 | Install and configure network components, both hardwareand software-based, to support organizational security |
| 2.2 | Given a scenario, use appropriate software tools to assess the security posture of an organization. |
| 2.3 | Given a scenario, troubleshoot common security issues. |
| 2.4 | Given a scenario, analyze and interpret output from security technologies. |
| 2.5 | Given a scenario, deploy mobile devices securely. |
| 2.6 | Given a scenario, implement secure protocols. |
| 3.1 | Explain use cases and purpose for frameworks, best practices and secure configuration guides. |
| 3.2 | Given a scenario, implement secure network architecture concepts. |
| 3.3 | Given a scenario, implement secure systems design |
| 3.4 | Explain the importance of secure staging deployment concepts. |
| 3.5 | Explain the security implications of embedded systems. |
| 3.6 | Summarize secure application development and deployment concepts. |
| 3.7 | Summarize cloud and virtualization concepts |
| 3.8 | Explain how resiliency and automation strategies reduce risk. |
| 3.9 | Explain the importance of physical security controls. |
| 4.1 | Compare and contrast identity and access management concepts |
| 4.2 | Given a scenario, install and configure identity and access services. |
| 4.3 | Given a scenario, implement identity and access management controls. |
| 4.4 | Given a scenario, differentiate common account management practices. |
| 5.1 | Explain the importance of policies, plans and procedures related to organizational security |
| 5.2 | Summarize business impact analysis concepts. |
| 5.3 | Explain risk management processes and concepts. |
| 5.4 | Given a scenario, follow incident response procedures. |
| 5.5 | Summarize basic concepts of forensics. |
| 5.6 | Explain disaster recovery and continuity of operation concepts. |
| 5.7 | Compare and contrast various types of controls. |
| 5.8 | Given a scenario, carry out data security and privacy practices. |
| 6.1 | Compare and contrast basic concepts of cryptography |
| 6.2 | Explain cryptography algorithms and their basic characteristics. |
| 6.3 | Given a scenario, install and configure wireless security settings. |
| 6.4 | Given a scenario, implement public key infrastructure. |