2.1 Compare and contrast common threat actors and motivations.
Threat actors
Blackmail
Nation-state
Financial gain
Unskilled attacker
Philosophical or Political beliefs
Hacktivist
Ethical hacker
Insider threat
Revenge
Organized crime
Disruption or chaos
Shadow IT
War
Attributes of actors
Internal or external
Resources and funding
Level of sophistication or Capability
Motivations
Data exfiltration
Espionage
Service disruption
3.1 Compare and contrast security implications of different architecture models
Architecture and infrastructure concepts
Software-defined networking (SDN)
Considerations
Availability
Cloud
On-premises
Resilience
Responsibility matrix
Centralized vs. decentralized
Cost
Hybrid considerations
Containerization
Responsiveness
Third-party vendors
Virtualization
Scalability
Infrastructure as code (IaC)
IoT
Ease of deployment
Serverless
Industrial control systems
Risk transference
Microservices
(ICS)/supervisory control and data acquisition (SCADA)
Ease of recovery
Network infrastructure
Patch availability
Physical isolation
Real-time operating system (RTOS)
Inability to patch
Air-gapped
Embedded systems
Power
Logical segmentation
High availability
Compute
3.3 Compare and contrast concepts and strategies to protect data.
Data Types
Private
Encryption
Regulated
Critical
Hashing
Trade Secret
General Data Considerations
Masking
Intellectual Property
Data States
Tokenization
Legal Information
Data at Rest
Obfuscation
Financial Information
Data in Transit
Segmentation
Human and Non-Human Readable
Data in Use
Permission Restrictions
Data Classifications
Data Sovereignty
Sensitive
Geolocation
Confidential
Methods to Secure Data
Public
Geographic Restrictions
Restricted
3.4 Explain the importance of resilience and recovery in security architecture.
High Availability
Testing
Load Balancing vs. Clustering
Tabletop Exercises
Site Considerations
Failover
Hot
Simulation
Cold
Parallel Processing
Warm
Backups
Geographic Dispersion
Onsite/Offsite
Platform Diversity
Frequency
Multi-Cloud Systems
Encryption
Continuity of Operations
Snapshots
Capacity Planning
Recovery
People
Replication
Technology
Journaling
Infrastructure
Power
Generators
Uninterruptible Power Supply (UPS)
4.2 Explain the security implications of proper hardware, software, and data asset management.
Acquisition and Procurement Process
Disposal and Decommissioning
Assignment and Accounting
Sanitization
Ownership
Destruction
Classification
Certification
Monitoring and Asset Tracking
Data Retention
Inventory
Enumeration
4.7 Explain the importance of automation and orchestration related to secure operations.
Use Cases of Automation and Scripting
Benefits
Single Point of Failure
Efficiency and Time Saving
Technical Debt
User Provisioning
Enforcing Baselines
Ongoing Supportability
Resource Provisioning
Standard Infrastructure Configurations
Guard Rails
Security Groups
Scaling in a Secure Manner
Ticket Creation
Employee Retention
Escalation
Reaction Time
Enabling/Disabling Services and Access
Workforce Multiplier
Other Considerations
Continuous Integration and Testing
Complexity
Integrations and Application
Cost
Programming Interfaces (APIs)
Process
Training
Legal Hold
Preparation
Testing
Chain of Custody
Detection
Tabletop Exercise
Acquisition
Analysis
Simulation
Reporting
Containment
Root Cause Analysis
Preservation
Eradication
Threat Hunting
E-Discovery
Recovery
Digital Forensics
Lessons Learned
5.1 Summarise elements of effective security governance.
Guidelines
Procedures
Government Entities
Policies
Change Management
Centralized/Decentralized
Acceptable Use Policy (AUP)
Onboarding/Offboarding
Roles and Responsibilities for Systems and Data
Information Security Policies
Playbooks
Business Continuity
External Considerations
Owners
Disaster Recovery
Regulatory
Controllers
Incident Response
Legal
Processors
Software Development Lifecycle (SDLC)
Industry
Custodians/Stewards
Local/Regional
Change Management
National
Standards
Global
Password
Monitoring and Revision
Access Control
Types of Governance Structures
Physical Security
Boards
Encryption
Committees
5.2 Explain elements of the risk management process.
Risk Identification
Risk Register
Risk Reporting
Risk Assessment
Key Risk Indicators
Business Impact Analysis
Ad Hoc
Risk Owners
Recovery Time Objective (RTO)
Recurring
Risk Threshold
Recovery Point Objective (RPO)
One-Time
Risk Tolerance
Mean Time to Repair (MTTR)
Continuous
Risk Appetite
Mean Time Between Failures (MTBF)
Risk Analysis
Expansionary
Qualitative
Conservative
Quantitative
Neutral
Single Loss Expectancy (SLE)
Risk Management Strategies
Annualized Loss Expectancy (ALE)
Transfer
Annualized Rate of Occurrence (ARO)
Accept
Probability
Exemption
Likelihood
Exception
Exposure Factor
Avoid
Impact
Mitigate
5.3 Explain the processes associated with third-party risk assessment and management.
Vendor Assessment
Agreement Types
Vendor Monitoring
Penetration Testing
Service-Level Agreement (SLA)
Questionnaires
Right-to-Audit Clause
Memorandum of Agreement (MOA)
Rules of Engagement
Evidence of Internal Audits
Memorandum of Understanding (MOU)
Independent Assessments
Supply Chain Analysis
Master Service Agreement (MSA)
Vendor Selection
Work Order (WO) / Statement of Work (SOW)
Due Diligence
Conflict of Interest
Non-Disclosure Agreement (NDA)
Business Partners Agreement (BPA)
5.4 Summarise elements of effective security compliance.
Compliance Reporting
Compliance Monitoring
Data Subject
Internal
Due Diligence/Care
Controller vs. Processor
External
Attestation and Acknowledgement
Ownership
Consequences of Non-Compliance
Internal and External
Data Inventory and Retention
Fines
Automation
Right to Be Forgotten
Sanctions
Privacy
Reputational Damage
Legal Implications
Loss of License
Local/Regional
Contractual Impacts
National
Global
5.6 Given a scenario, implement security awareness practices
Phishing
User Guidance and Training
Reporting and Monitoring
Campaigns
Policy/Handbooks
Initial
Recognizing a Phishing Attempt
Situational Awareness
Recurring
Responding to Reported Suspicious Messages
Insider Threat
Development
Password Management
Execution
Anomalous Behavior Recognition
Removable Media and Cables
Risky
Social Engineering
Unexpected
Operational Security
Unintentional
Hybrid/Remote Work Environments
6.4 Introduction to AI-powered information extraction concepts.
Understand the Extraction of Data from Images
Understand the Extraction of Data from Forms
Understand Multimodal Data Extraction
Understand Data Extraction for Knowledge Mining
6.5 Get started with AI-powered information extraction in Azure.
Azure AI Services for Information Extraction
Extract Information with Azure AI Vision
Extract Multimodal Information with Azure AI Content Understanding
Extract Information from Forms with Azure AI Document Intelligence
Create a Knowledge Mining Solution with Azure AI Search
6.6 Understand Azure AI services for computer vision.
Understand Azure AI Services for Computer Vision
Understand Azure AI Vision Image Analysis Capabilities
Understand Azure AI Vision Face Service Capabilities
Get Started in Azure AI Foundry Portal