Table of Contents
Chapter 1. Cybersecurity and the Security Operations Center
Explain the role of the Cybersecurity Operations Analyst in the enterprise.
1.1 The Danger Explain why networks and data are attacked.
1.2 Fighters in the War Against Cybercrime Explain how to prepare for a career in Cybersecurity operations.
Chapter 2. Windows Operating System
Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
2.1 Windows Overview Explain the operation of the Windows Operating System.
2.2 Windows Administration Explain how to secure Windows endpoints.
Chapter 3. Linux Operating System
Explain the features and characteristics of the Linux OperatingSystem.
3.1 Linux Overview Perform basic operations in the Linux shell.
3.2 Linux Administration Perform basic Linux administration tasks.
3.3 Linux Hosts Perform basic security-related tasks on a Linux host.
Chapter 4. Network Protocols and Services
Analyze the operation of network protocols and services.
4.1 Network Protocols Explain how protocols enable network operations.
4.2 Ethernet and Internet Protocol Explain how the Ethernet and IP protocols support network
communication.
4.3 Connectivity Verification Use common testing utilities to verify and test network connectivity.
4.4 Address Resolution Protocol Explain how the address resolution protocol enables communication
on a network.
4.5 The Transport Layer Explain how transport layer protocols support network functionality.
4.6 Network Services Explain how network services enable network functionality.
Chapter 5. Network Infrastructure
Explain the operation of the network infrastructure.
5.1 Network Communication Devices Explain how network devices enable wired and wireless network
communication.
5.2 Network Security Infrastructure Explain how devices and services are used to enhance network
security.
5.3 Network Representations Explain how networks and network topologies are represented.
Chapter 6. Principles of Network Security
Classify the various types of network attacks.
6.1 Attackers and Their Tools Explain how networks are attacked.
6.2 Common Threats and Attacks Explain the various types of threats and attacks.
Chapter 7. Network Attacks: A Deeper Look
Use network monitoring tools to identify attacks against network protocols and services.
7.1 Observing Network Operation Explain network traffic monitoring.
7.2 Attacking the Foundation Explain how TCP/IP vulnerabilities enable network attacks.
7.3 Attacking What We Do Explain how common network applications and services are vulnerable
to attack.
Chapter 8. Protecting the Network
Use various methods to prevent malicious access to computer networks, hosts, and data.
8.1 Understanding Defense Explain approaches to network security defense.
8.2 Access Control Explain access control as a method of protecting a network.
8.3 Threat Intelligence Use various intelligence sources to locate current security threats.
Chapter 9. Cryptography and the Public Key Infrastructure
Explain the impacts of cryptography on network security monitoring.
9.1 Cryptography Use tools to encrypt and decrypt data.
9.2 Public Key Cryptography Explain how the public key infrastructure (PKI) supports network
security.
Chapter 10. Endpoint Security and Analysis
Explain how to investigate endpoint vulnerabilities and attacks.
10.1 Endpoint Protection Use a malware analysis website to generate a malware analysis
report.
10.2 Endpoint Vulnerability Assessment Classify endpoint vulnerability assessment information.
Chapter 11. Security Monitoring
Identify network security alerts.
11.1 Technologies and Protocols Explain how security technologies affect security monitoring.
11.2 Log Files Explain the types of log files used in security monitoring
Chapter 12. Intrusion Data Analysis
Analyze network intrusion data to verify potential exploits.
12.1 Evaluating Alerts Explain the process of evaluating alerts.
12.2 Working with Network Security Data Interpret data to determine the source of an alert.
12.3 Digital Forensics Explain how the cybersecurity analyst handles digital forensics and
evidence to ensure proper attack attribution.
Chapter 13. Incident Response and Handling
Apply incident response models to manage network security incidents.
13.1 Incident Response Models Apply incident response models to an intrusion event.
13.2 CSIRTs and NIST 800-61r2 Apply standards specified in NIST 800-61r2 to a computer security
incident.