1Section 1: General security concepts (12%)
18Asset management
2Security controls
19Vulnerability management
3Fundamental concepts
20Alerting and monitoring
4Change management
21Enterprise security
5Cryptographic solutions
22Identity and access management
6Threats, vulnerabilities, and mitigations (22%)
23Automation and orchestration
7Threat actors and motivations
24Incident response
8Threat vectors and attack surfaces
25Data sources
9Vulnerabilities
26Security program management and oversight (20%)
10Malicious activity
27Security governance
11Mitigation techniques
28Risk management
12Security architecture (18%)
29Third-party risk
13Architecture models
30Security compliance
14Enterprise infrastructure
31Audits and assessments
15Data protection
32Security awareness
16Security operations (28%)
33About Author
17Computing resources