Table of Contents
- Understanding Security Fundamentals
- Implementing Public Key Infrastructure
- Investigating Identity and Access Management
- Exploring Virtualization and Cloud Concepts
- Monitoring, Scanning, and Penetration Testing
- Understanding Secure and Insecure Protocols
- Delving into Network and Security Concepts
- Securing Wireless and Mobile Solutions
- Identifying Threats, Attacks, and Vulnerabilities
- Governance, Risk, and Compliance
- Managing Application Security
- Dealing with Incident Response Procedures
- Mock Exam 1
- Mock Exam 2

