Study Planner
Practice Test |
Reading |
Review |
Element |
Task |
Goal Date |
First Date Completed |
Second Date Completed (Optional) |
Notes |
Introduction |
Read Introduction |
||||
1. Comparing and Contrasting Different Types of Social Engineering Techniques |
Read Foundation Topics |
||||
1. Comparing and Contrasting Different Types of Social Engineering Techniques |
Review Key Topics |
||||
1. Comparing and Contrasting Different Types of Social Engineering Techniques |
Define Key Terms |
||||
1. Comparing and Contrasting Different Types of Social Engineering Techniques |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 1 in practice test software |
||||
2. Analyzing Potential Indicators to Determine the Type of Attack |
Read Foundation Topics |
||||
2. Analyzing Potential Indicators to Determine the Type of Attack |
Review Key Topics |
||||
2. Analyzing Potential Indicators to Determine the Type of Attack |
Define Key Terms |
||||
2. Analyzing Potential Indicators to Determine the Type of Attack |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 2 in practice test software |
||||
3. Analyzing Potential Indicators Associated with Application Attacks |
Read Foundation Topics |
||||
3. Analyzing Potential Indicators Associated with Application Attacks |
Review Key Topics |
||||
3. Analyzing Potential Indicators Associated with Application Attacks |
Define Key Terms |
||||
3. Analyzing Potential Indicators Associated with Application Attacks |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 3 in practice test software |
||||
4. Analyzing Potential Indicators Associated with Network Attacks |
Read Foundation Topics |
||||
4. Analyzing Potential Indicators Associated with Network Attacks |
Review Key Topics |
||||
4. Analyzing Potential Indicators Associated with Network Attacks |
Define Key Terms |
||||
4. Analyzing Potential Indicators Associated with Network Attacks |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 4 in practice test software |
||||
5. Understanding Different Threat Actors, Vectors, and Intelligence Sources |
Read Foundation Topics |
||||
5. Understanding Different Threat Actors, Vectors, and Intelligence Sources |
Review Key Topics |
||||
5. Understanding Different Threat Actors, Vectors, and Intelligence Sources |
Define Key Terms |
||||
5. Understanding Different Threat Actors, Vectors, and Intelligence Sources |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 5 in practice test software |
||||
6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities |
Read Foundation Topics |
||||
6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities |
Review Key Topics |
||||
6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities |
Define Key Terms |
||||
6. Understanding the Security Concerns Associated with Various Types of Vulnerabilities |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 6 in practice test software |
||||
7. Summarizing the Techniques Used in Security Assessments |
Read Foundation Topics |
||||
7. Summarizing the Techniques Used in Security Assessments |
Review Key Topics |
||||
7. Summarizing the Techniques Used in Security Assessments |
Define Key Terms |
||||
7. Summarizing the Techniques Used in Security Assessments |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 7 in practice test software |
||||
8. Understanding the Techniques Used in Penetration Testing |
Read Foundation Topics |
||||
8. Understanding the Techniques Used in Penetration Testing |
Review Key Topics |
||||
8. Understanding the Techniques Used in Penetration Testing |
Define Key Terms |
||||
8. Understanding the Techniques Used in Penetration Testing |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 8 in practice test software |
||||
9. Understanding the Importance of Security Concepts in an Enterprise Environment |
Read Foundation Topics |
||||
9. Understanding the Importance of Security Concepts in an Enterprise Environment |
Review Key Topics |
||||
9. Understanding the Importance of Security Concepts in an Enterprise Environment |
Define Key Terms |
||||
9. Understanding the Importance of Security Concepts in an Enterprise Environment |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 9 in practice test software |
||||
10. Summarizing Virtualization and Cloud Computing Concepts |
Read Foundation Topics |
||||
10. Summarizing Virtualization and Cloud Computing Concepts |
Review Key Topics |
||||
10. Summarizing Virtualization and Cloud Computing Concepts |
Define Key Terms |
||||
10. Summarizing Virtualization and Cloud Computing Concepts |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 10 in practice test software |
||||
11. Summarizing Secure Application Development, Deployment, and Automation Concepts |
Read Foundation Topics |
||||
11. Summarizing Secure Application Development, Deployment, and Automation Concepts |
Review Key Topics |
||||
11. Summarizing Secure Application Development, Deployment, and Automation Concepts |
Define Key Terms |
||||
11. Summarizing Secure Application Development, Deployment, and Automation Concepts |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 11 in practice test software |
||||
12. Summarizing Authentication and Authorization Design Concepts |
Read Foundation Topics |
||||
12. Summarizing Authentication and Authorization Design Concepts |
Review Key Topics |
||||
12.Summarizing Authentication and Authorization Design Concepts |
Define Key Terms |
||||
12. Summarizing Authentication and Authorization Design Concepts |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 12 in practice test software |
||||
13. Implementing Cybersecurity Resilience |
Read Foundation Topics |
||||
13. Implementing Cybersecurity Resilience |
Review Key Topics |
||||
13. Implementing Cybersecurity Resilience |
Define Key Terms |
||||
13. Implementing Cybersecurity Resilience |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 13 in practice test software |
||||
14. Understanding the Security Implications of Embedded and Specialized Systems |
Read Foundation Topics |
||||
14. Understanding the Security Implications of Embedded and Specialized Systems |
Review Key Topics |
||||
14. Understanding the Security Implications of Embedded and Specialized Systems |
Define Key Terms |
||||
14. Understanding the Security Implications of Embedded and Specialized Systems |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 14 in practice test software |
||||
15. Understanding the Importance of Physical Security Controls |
Read Foundation Topics |
||||
15. Understanding the Importance of Physical Security Controls |
Review Key Topics |
||||
15. Understanding the Importance of Physical Security Controls |
Define Key Terms |
||||
15. Understanding the Importance of Physical Security Controls |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 15 in practice test software |
||||
16. Summarizing the Basics of Cryptographic Concepts |
Read Foundation Topics |
||||
16. Summarizing the Basics of Cryptographic Concepts |
Review Key Topics |
||||
16. Summarizing the Basics of Cryptographic Concepts |
Define Key Terms |
||||
16. Summarizing the Basics of Cryptographic Concepts |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 16 in practice test software |
||||
17. Implementing Secure Protocols |
Read Foundation Topics |
||||
17. Implementing Secure Protocols |
Review Key Topics |
||||
17. Implementing Secure Protocols |
Define Key Terms |
||||
17. Implementing Secure Protocols |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 17 in practice test software |
||||
18. Implementing Host or Application Security Solutions |
Read Foundation Topics |
||||
18. Implementing Host or Application Security Solutions |
Review Key Topics |
||||
18. Implementing Host or Application Security Solutions |
Define Key Terms |
||||
18. Implementing Host or Application Security Solutions |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 18 in practice test software |
||||
19. Implementing Secure Network Designs |
Read Foundation Topics |
||||
19. Implementing Secure Network Designs |
Review Key Topics |
||||
19. Implementing Secure Network Designs |
Define Key Terms |
||||
19. Implementing Secure Network Designs |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 19 in practice test software |
||||
20. Installing and Configuring Wireless Security Settings |
Read Foundation Topics |
||||
20. Installing and Configuring Wireless Security Settings |
Review Key Topics |
||||
20. Installing and Configuring Wireless Security Settings |
Define Key Terms |
||||
20. Installing and Configuring Wireless Security Settings |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 20 in practice test software |
||||
21. Implementing Secure Mobile Solutions |
Read Foundation Topics |
||||
21. Implementing Secure Mobile Solutions |
Review Key Topics |
||||
21. Implementing Secure Mobile Solutions |
Define Key Terms |
||||
21. Implementing Secure Mobile Solutions |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 21 in practice test software |
||||
22. Applying Cybersecurity Solutions to the Cloud |
Read Foundation Topics |
||||
22. Applying Cybersecurity Solutions to the Cloud |
Review Key Topics |
||||
22. Applying Cybersecurity Solutions to the Cloud |
Define Key Terms |
||||
22. Applying Cybersecurity Solutions to the Cloud |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 22 in practice test software |
||||
23. Implementing Identity and Account Management Controls |
Read Foundation Topics |
||||
23. Implementing Identity and Account Management Controls |
Review Key Topics |
||||
23. Implementing Identity and Account Management Controls |
Define Key Terms |
||||
23. Implementing Identity and Account Management Controls |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 23 in practice test software |
||||
24. Implementing Authentication and Authorization Solutions |
Read Foundation Topics |
||||
24. Implementing Authentication and Authorization Solutions |
Review Key Topics |
||||
24. Implementing Authentication and Authorization Solutions |
Define Key Terms |
||||
24. Implementing Authentication and Authorization Solutions |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 24 in practice test software |
||||
25. Implementing Public Key Infrastructure |
Read Foundation Topics |
||||
25. Implementing Public Key Infrastructure |
Review Key Topics |
||||
25. Implementing Public Key Infrastructure |
Define Key Terms |
||||
25. Implementing Public Key Infrastructure |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 25 in practice test software |
||||
26. Using the Appropriate Tool to Assess Organizational Security |
Read Foundation Topics |
||||
26. Using the Appropriate Tool to Assess Organizational Security |
Review Key Topics |
||||
26. Using the Appropriate Tool to Assess Organizational Security |
Define Key Terms |
||||
26. Using the Appropriate Tool to Assess Organizational Security |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 26 in practice test software |
||||
27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response |
Read Foundation Topics |
||||
27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response |
Review Key Topics |
||||
27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response |
Define Key Terms |
||||
27. Summarizing the Importance of Policies, Processes, and Procedures for Incident Response |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 27 in practice test software |
||||
28. Using Appropriate Data Sources to Support an Investigation |
Read Foundation Topics |
||||
28. Using Appropriate Data Sources to Support an Investigation |
Review Key Topics |
||||
28. Using Appropriate Data Sources to Support an Investigation |
Define Key Terms |
||||
28. Using Appropriate Data Sources to Support an Investigation |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 28 in practice test software |
||||
29. Applying Mitigation Techniques or Controls to Secure an Environment |
Read Foundation Topics |
||||
29. Applying Mitigation Techniques or Controls to Secure an Environment |
Review Key Topics |
||||
29. Applying Mitigation Techniques or Controls to Secure an Environment |
Define Key Terms |
||||
29. Applying Mitigation Techniques or Controls to Secure an Environment |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 29 in practice test software |
||||
30. Understanding the Key Aspects of Digital Forensics |
Read Foundation Topics |
||||
30. Understanding the Key Aspects of Digital Forensics |
Review Key Topics |
||||
30. Understanding the Key Aspects of Digital Forensics |
Define Key Terms |
||||
30. Understanding the Key Aspects of Digital Forensics |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 30 in practice test software |
||||
31. Comparing and Contrasting the Various Types of Controls |
Read Foundation Topics |
||||
31. Comparing and Contrasting the Various Types of Controls |
Review Key Topics |
||||
31. Comparing and Contrasting the Various Types of Controls |
Define Key Terms |
||||
31. Comparing and Contrasting the Various Types of Controls |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 31 in practice test software |
||||
32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture |
Read Foundation Topics |
||||
32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture |
Review Key Topics |
||||
32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture |
Define Key Terms |
||||
32. Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 32 in practice test software |
||||
33. Understanding the Importance of Policies to Organizational Security |
Read Foundation Topics |
||||
33. Understanding the Importance of Policies to Organizational Security |
Review Key Topics |
||||
33. Understanding the Importance of Policies to Organizational Security |
Define Key Terms |
||||
33. Understanding the Importance of Policies to Organizational Security |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 33 in practice test software |
||||
34. Summarizing Risk Management Processes and Concepts |
Read Foundation Topics |
||||
34. Summarizing Risk Management Processes and Concepts |
Review Key Topics |
||||
34. Summarizing Risk Management Processes and Concepts |
Define Key Terms |
||||
34. Summarizing Risk Management Processes and Concepts |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 34 in practice test software |
||||
35. Understanding Privacy and Sensitive Data Concepts in Relation to Security |
Read Foundation Topics |
||||
35. Understanding Privacy and Sensitive Data Concepts in Relation to Security |
Review Key Topics |
||||
35. Understanding Privacy and Sensitive Data Concepts in Relation to Security |
Define Key Terms |
||||
35. Understanding Privacy and Sensitive Data Concepts in Relation to Security |
Complete Review Questions section |
||||
Practice Test |
Take practice test in study mode using Exam Bank 1 questions for Chapter 35 in practice test software |
||||
36. Final Preparation |
|||||
36. Final Preparation |
Take practice test in study mode for all book questions in practice test software |
||||
36. Final Preparation |
Review all Key Topics in all chapters |
||||
36. Final Preparation |
Take practice test in practice exam mode using Exam Bank #1 questions for all chapters |
||||
36. Final Preparation |
Take practice test in practice exam mode using Exam Bank #2 questions for all chapters |