Back to Home
Quizlet Resources
Domain Reviews are set to tests by default but you can also choose from match, learn, flash cards and spell. In the bottom-right corner of the content window, select “Choose a Study Mode” to change the way the content is being fed.
Domain 1 - Attacks, Threats, and Vulnerabilities.
Domain 2 - Architecture and Design.
Sub 2.1 - Security Concepts in an Enterprise Environment
Sub 2.2 - Virtualization and Cloud Computing Concepts
Sub 2.3 - Application Development, Deployment, and Automation Concepts
Sub 2.4 - Authentication and Authorization Design Concepts
Sub 2.5 - Cybersecurity Resilience
Sub 2.6 - Embedded and Specialized Systems
Sub 2.7 - Physical Security Controls
Sub 2.8 - Cryptographic Concepts
Domain 3 - Implementation.
Sub 3.1 - Implement Secure Protocols
Sub 3.2 - Host or App Security Solutions
Sub 3.3 - Implement Secure Network Designs
Sub 3.4 - Install and Configure Wireless Security Settings
Sub 3.5 - Implement Secure Mobile Solutions
Sub 3.6 - Cyber Solutions in the Cloud
Sub 3.7 - Implement Identity and Account Management Controls
Sub 3.8 - Implement Authentication and Authorization Solutions
Sub 3.9 - Implement Public Key Infrastructure
Domain 4 - Operations and Incident Response.
Sub 4.1 - Appropriate Tools to Assess Org. Security
Sub 4.2 - Policies, Processes, and Procedures for Incident Response
Sub 4.3 - Utilize Appropriate Sources to Support an Investigation
Sub 4.4 - Apply Mitigation Techniques or Controls to Secure an Environment
Sub 4.5 - Key Aspects of Digital Forensics
Domain 5 - Governance, Risk, and Compliance.
Sub 5.1 - Compare and Contrast Various Types of Controls
Sub 5.2 - Regulations, Standards, or Frameworks that Impact Org. Security Posture
Sub 5.3 - Importance of Policies to Org. Security
Sub 5.4 - Risk Management Processes and Concepts
Sub 5.5 - Privacy and Sensitive Data Concepts in Relation to Security
Additional Test Resources