Introduction
Research, development, and enterprise cybersecurity
()
What you should know
()
About the exam
()
1. Research Methods
Conducting research
()
Threat intelligence on latest attacks
()
Current threats and threat models
()
Zero-day mitigation controls
()
Emerging social media platforms
()
Big data and artificial intelligence
()
Integration research within the business
()
Computer emergency response team (CERT)
()
Conferences, conventions, consultants, and vendors
()
Threat actor activities
()
Emerging threat sources
()
2 Security Activities across the Life Cycle
Systems development life cycle
()
Operational activities
()
Asset disposal and asset reuse
()
Software development life cycle
()
Application security frameworks
()
Software assurance
()
Approaches to development
()
Secure coding standards
()
Documentation
()
Validation and acceptance testing
()
Adapting solutions to meet a need
()
Asset management and inventory control
()
3. Collaboration with Other Business Units
Collaboration across business units
()
Sales staff
()
Programmer
()
Database administrator
()
Network administrator
()
Management and executive management
()
Financial
()
Human resources
()
Emergency response team
()
Facilities manager
()
Physical security manager
()
Legal counsel
()
Governance, risk, and compliance committee
()
Providing guidance to senior management
()
Effective collaboration to implement security solutions
()
Conclusion
What to do next
()