16 Chapter 7: PKI and Cryptographic Applications Asymmetric Cryptography Hash Functions Digital Signatures Public Key Infrastructure Asymmetric Key Management Hybrid Cryptography Applied Cryptography Cryptographic Attacks Summary Exam Essentials Written Lab Review Questions
17 Chapter 8: Principles of Security Models, Design, and Capabilities Secure Design Principles Techniques for Ensuring CIA Understand the Fundamental Concepts of Security Models Select Controls Based on Systems Security Requirements Understand Security Capabilities of Information Systems Summary Exam Essentials Written Lab Review Questions
18 Chapter 9: Security Vulnerabilities, Threats, and Countermeasures Shared Responsibility Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements Client-Based Systems Server-Based Systems Industrial Control Systems Distributed Systems High-Performance Computing (HPC) Systems Internet of Things Edge and Fog Computing Embedded Devices and Cyber-Physical Systems Specialized Devices Microservices Infrastructure as Code Virtualized Systems Containerization Serverless Architecture Mobile Devices Essential Security Protection Mechanisms Common Security Architecture Flaws and Issues Summary Exam Essentials Written Lab Review Questions
19 Chapter 10: Physical Security Requirements Apply Security Principles to Site and Facility Design Implement Site and Facility Security Controls Implement and Manage Physical Security Summary Exam Essentials Written Lab Review Questions
20 Chapter 11: Secure Network Architecture and Components OSI Model TCP/IP Model Analyzing Network Traffic Common Application Layer Protocols Transport Layer Protocols Domain Name System Internet Protocol (IP) Networking ARP Concerns Secure Communication Protocols Implications of Multilayer Protocols Microsegmentation Wireless Networks Other Communication Protocols Cellular Networks Content Distribution Networks (CDNs) Secure Network Components Summary