Table of Contents
- Build an Overall Security Strategy and Architecture
- Design a Security Operations Strategy
- Design an Identity Security Strategy
- Design a Regulatory Compliance Strategy
- Evaluate Security Posture and Recommend Technical Strategies to Manage Risk
- Design a Strategy for Securing Server and Client Endpoints
- Design a Strategy for Securing SaaS, PaaS, and IaaS
- Specify Security Requirements for Applications
- Design a Strategy for Securing Data

