Lesson 1: 
        Managing Risk
    
        Topic A: 
        Identify the Importance of Risk Management
    
    
        Topic B: 
        Assess Risk
    
    
        Topic C: 
        Mitigate Risk
    
    
        Topic D: 
        Integrate Documentation into Risk Management
    
    
        Lesson 2: 
        Integrating Computing, Communications, and Business Disciplines
    
    
        Topic A: 
        Facilitate Collaboration Across Business Units
    
    
        Topic B: 
        Secure Communications and Collaboration Solutions
    
    
        Topic C: 
        Implement Security Activities Throughout the Technology Life Cycle
    
    
        Lesson 3: 
        Using Research and Analysis to Secure the Enterprise
    
    
        Topic A: 
        Determine Industry Trends and Effects on the Enterprise
    
    
        Topic B: 
        Analyze Scenarios to Secure the Enterprise
    
    
        Lesson 4: 
        Integrating Advanced Authentication and Authorization Techniques
    
    
        Topic A: 
        Implement Authentication and Authorization Technologies
    
    
        Topic B: 
        Implement Advanced Identity Management
    
    
        Lesson 5: 
        Implementing Cryptographic Techniques
    
    
        Topic A: 
        Describe Cryptographic Concepts
    
    
        Topic B: 
        Choose Cryptographic Techniques
    
    
        Topic C: 
        Choose Cryptographic Implementations
    
    
        Lesson 6: 
        Implementing Security Controls for Hosts
    
    
        Topic A: 
        Select Host Hardware and Software
    
    
        Topic B: 
        Harden Hosts
    
    
        Topic C: 
        Virtualize Servers and Desktops
    
    
        Topic D: 
        Implement Cloud Augmented Security Services
    
    
        Topic E: 
        Protect Boot Loaders
    
    
        Lesson 7: 
        Implementing Security Controls for Enterprise Storage
    
    
        Topic A: 
        Identify Storage Types and Protocols
    
    
        Topic B: 
        Implement Secure Storage Controls
    
    
        Lesson 8: 
        Analyzing and Implementing Network Security
    
    
        Topic A: 
        Analyze Network Security Components and Devices
    
    
        Topic B: 
        Analyze Network-Enabled Devices
    
    
        Topic C: 
        Analyze Advanced Network Design
    
    
        Topic D: 
        Configure Controls for Network Security
    
    
        Lesson 9: 
        Implementing Security Controls for Applications
    
    
        Topic A: 
        Identify General Application Vulnerabilities
    
    
        Topic B: 
        Identify Web Application Vulnerabilities
    
    
        Topic C: 
        Implement Application Security Controls
    
    
        Lesson 10: 
        Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
    
    
        Topic A: 
        Implement Security Standards in the Enterprise
    
    
        Topic B: 
        Select Technical Deployment Models
    
    
        Topic C: 
        Secure the Design of the Enterprise Infrastructure
    
    
        Topic D: 
        Secure Enterprise Application Integration Enablers
    
    
        Lesson 11: 
        Conducting Vulnerability Assessments
    
    
        Topic A: 
        Select Vulnerability Assessment Methods
    
    
        Topic B: 
        Select Vulnerability Assessment Tools
    
    
        Lesson 12: 
        Responding to and Recovering from Incidents
    
    
        Topic A: 
        Design Systems to Facilitate Incident Response
    
    
        Topic B: 
        Conduct Incident and Emergency Responses
    
    
        Appendix A: 
        Mapping Course Content to CompTIA Advanced Security Practitioner (CASP) Exam CAS-002