Professional Documents
Culture Documents
Exam Blueprint
Domain
S. No. Domain Sub Domains Topics
%
Threats Sources
Information Security Threat Actors/Agents
Threats and Malware and its Types
Vulnerabilities Vulnerabilities
Types of Vulnerabilities
Information Security Attacks
Information
Hacking Methodologies and
Security
1 Frameworks 26
Threats and
Attacks Network-level Attacks
Information Security Application-level and OS-level
Attacks Attacks
Social Engineering Attacks
Wireless Network-specific Attacks
IoT, OT, and Cloud Attacks
Cryptographic Attacks
Network Security Information Security Fundamentals
Network Fundamentals Network Security Fundamentals
Security Access Control Principles,
2 2
Fundamenta Identification, Terminologies, and Models
ls Authentication, and
Authorization Identity and Access Management
(IAM)
Data Acquisition
Evidence Analysis
Business Continuity (BC) and
Disaster Recovery (DR)
Business Continuity
BC/DR Activities
and Disaster Recovery
Business Continuity Plan (BCP) and
Disaster Recovery Plan (DRP)
Risk Management
Risk Management Risk Management Phases
Risk Management Frameworks