| Topic | Details |
| Topic 1 | - Mobile Device Security: This section of the 212-82 exam covers smartphone and gadget security to ensure they are safe from different types of malware.
|
| Topic 2 | - IoT and OT Security: In this exam section, the topics covered relate to IoT and OT Security and how to safeguard online IoT) devices and streamline OT from malicious attacks.
|
| Topic 3 | - Application Security: In this module, the focus is given to the know-how of safeguarding the applications from various attackers.
|
| Topic 4 | - Computer Forensics: This section of the exam covers data collection, analysis, and saving of digital evidence to reduce cybersecurity issues.
|
| Topic 5 | - Networks Log Monitoring and Analysis: This section of the exam covers the analysis of network device logs to mitigate security issues to perform fixes.
|
| Topic 6 | - Network Traffic Monitoring: This section of the exam covers techniques to examine information flow through a network to improve its health.
|
| Topic 7 | - Network Security Controls- Administrative Controls: In this section, the focus is given to non-technical rules for ensuring the security of networks.
|
| Topic 8 | - Risk Management: The Risk Management section deals with the knowledge of how to pinpoint, examine, and solve potential cybersecurity threats and manage risks.
|
| Topic 9 | - Data Security: In this exam section, the focus is given to safeguarding information in transit and data that is utilized.
|
| Topic 10 | - Network Security Controls- Physical Controls: This section covers how to secure the physical environment of the entire computer network.
|
| Topic 11 | - Identification, Authentication, Authorization: In this section, focus is given on the identification, Authentication, and Authorization (IAA) to improve access mechanisms to safeguard information.
|
| Topic 12 | - Cryptography: This module covers how to secure data by scrambling it with algorithms and keys.
|
| Topic 13 | - Information Security Threats and Vulnerabilities: This module is about the concepts related to cybersecurity threats and vulnerabilities.
|
| Topic 14 | - Virtualization and Cloud Computing: In this section, topics discussed include the way these tools operate and secure networks.
|
| Topic 15 | - Incident Response: The section deals with using an effective strategy to pinpoint, remove, and recover from security issues.
|
| Topic 16 | - Network Troubleshooting: This section of the exam covers the Network Troubleshooting competencies that aim to pinpoint and diagnose various network problems and provide guidance for solving connectivity issues.
|
| Topic 17 | - Information Security Attacks: In this module, the focus is given to various security attacks and threats and strategies used by attackers.
|