Authentication
Kerberos
CHAP
Certificates
Username/Password
Tokens
Multi-Factor
Mutual Authentication
Biometrics
Attacks
DOS/DDOS
Back Door
Spoofing
Man in the Middle
Replay
TCP/IP Hijacking
Weak Keys
Social Engineering
Password Guessing
Software Exploitation
Viruses, Trojan Horses, Logic Bombs
Worms
Remote Access
802.1x
VPN
RADIUS
TACACS/+
L2TP/PPTP
SSH
IPSEC
Vulnerabilities
Email
S/MIME
PGP
Vulnerabilities
SPAM
Hoaxes
Web
SSL/TLS
HTTP/S
Instant Messaging
Vulnerabilities
File Transfer
S/FTP
Blind FTP/Anonymous
File sharing
Vulnerabilities
Packet Sniffing
Wireless (Awareness, conceptual knowledge and understanding)
WTLS
802.11x
WEP/WAP
Vulnerabilities
Hoaxes
Devices (Awareness, conceptual knowledge and understanding)
Firewalls, Routers, Switches
Wireless
Modems
RAS
Telecom/PBX
VPN
IDS
Network
Monitoring/Diagnostic
Workstations
Servers
Mobile Devices
Media
Coax
UTP/STP
Fiber
Removable media
Security Topologies (Awareness, conceptual knowledge and understanding)
Security Zones
DMZ
Intranet
Extranet
VLANs
NAT
Tunneling
Intrusion Detection (Awareness, conceptual knowledge and understanding)
Network Based
Host Based
Honey Pots
Incident Response
Security Baselines
OS/NOS Hardening (Concepts and processes)
Network Hardening
Application Hardening
Updates (Hotfixes, Service Packs, Patches)
Basics of Cryptography
Algorithms
Concepts of using cryptography
PKI
Standards and Protocols
Key Management/Certificate Lifecycle
Physical Security
Access Control
Physical Barriers
Biometrics
Social Engineering
Environment
Wireless Cells
Location
Shielding
Fire Suppression
Disaster Recovery
Backups
Secure Recovery