Information Security Threats and Vulnerabilities: This module is about the concepts related to cybersecurity threats and vulnerabilities.
Information Security Attacks: In this module, the focus is given to various security attacks and threats and strategies used by attackers.
Network Security Fundamentals: In this section, concepts discussed relate to the comprehension of security networks.
Identification, Authentication, Authorization: In this section, focus is given on the identification, Authentication, and Authorization (IAA) to improve access mechanisms to safeguard information.
Network Security Controls- Administrative Controls: In this section, the focus is given to non-technical rules for ensuring the security of networks.
Network Security Controls- Physical Controls: This section covers how to secure the physical environment of the entire computer network.
Network Security Controls: Technical Controls: In this section, the exam covers the aspects of software and hardware that help to safeguard networks.
Application Security: In this module, the focus is given to the know-how of safeguarding the applications from various attackers.
Virtualization and Cloud Computing: In this section, topics discussed include the way these tools operate and secure networks.
Mobile Device Security: This section of the 212-82 exam covers smartphone and gadget security to ensure they are safe from different types of malware.
IoT and OT Security: In this exam section, the topics covered relate to IoT and OT Security and how to safeguard online IoT) devices and streamline OT from malicious attacks.
Cryptography: This module covers how to secure data by scrambling it with algorithms and keys.
Data Security: In this exam section, the focus is given to safeguarding information in transit and data that is utilized.
Network Troubleshooting: This section of the exam covers the Network Troubleshooting competencies that aim to pinpoint and diagnose various network problems and provide guidance for solving connectivity issues.
Network Traffic Monitoring: This section of the exam covers techniques to examine information flow through a network to improve its health.
Networks Log Monitoring and Analysis: This section of the exam covers the analysis of network device logs to mitigate security issues to perform fixes.
Incident Response: The section deals with using an effective strategy to pinpoint, remove, and recover from security issues.
Computer Forensics: This section of the exam covers data collection, analysis, and saving of digital evidence to reduce cybersecurity issues.
Business Continuity and Disaster Recovery: In this section, topics discussed include strategies and policies to ensure smooth operations and how to recover from various disruptions.
Risk Management: The Risk Management section deals with the knowledge of how to pinpoint, examine, and solve potential cybersecurity threats and manage risks.