Foundation

Foundation-Personal Health Information (PHI)
Personal Health Information (PHI) data security standards.

Foundation-Incident Response In Cloud Service Models
Cloud service models and how those models can limit incident response.

Foundation-Information Classification Program & Procedures For Information Compromise
An organization's information classification program and procedures for information compromise.

Foundation-Network Security Architecture Concepts
Network Security Architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Foundation-Cyber Defense & Information Security Policies, Procedures, & Regulations
Cyber defense and information security policies, procedures, and regulations

Foundation-Application Security Risks
Application Security Risks (e.g. Open Web Application Security Project Top 10 list)

Foundation-Cyber Attackers
Cyber Attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).

Foundation-Different Classes Of Attacks
Different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).

Foundation-Network Attack’s Relationships
what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.

Foundation-Intrusion Detection Methodologies & Techniques
Intrusion detection methodologies and techniques for detecting host and network-based intrusions.

Foundation-A Remote-Access VPN Allows Individual Users To Establish Secure
Incident Categories, Incident responses, and timelines for responses.

Foundation-Remote Access Technology
A remote-access VPN allows individual users to establish secure...

Foundation-System & Application Security Threats & Vulnerabilities
System and application security threats and vulnerabilities ...