| トピック | 出題範囲 |
| トピック 1 | - Zero Trust Architecture: Covers NIST SP 800-207 framework, Zero Trust principles, Falcon's implementation, differences from traditional security models, use cases, and Zero Trust Assessment score calculation.
|
| トピック 2 | - Risk Management with Policy Rules: Covers creating and managing policy rules and groups, triggers, conditions, enabling
- disabling rules, applying changes, and required Falcon roles.
|
| トピック 3 | - Threat Hunting and Investigation: Focuses on identity-based detections and incidents, investigation pivots, incident trees, detection evolution, filtering, managing exclusions and exceptions, and risk types.
|
| トピック 4 | - Identity Protection Tenets: Examines Falcon Identity Protection's architecture, domain traffic inspection, EDR complementation, human vulnerability protection, log-free detections, and identity-based attack mitigation.
|
| トピック 5 | - Domain Security Assessment: Focuses on domain risk scores, trends, matrices, severity
- likelihood
- consequence factors, risk prioritization, score reduction, and configuring security goals and scopes.
|
| トピック 6 | - Falcon Identity Protection Fundamentals: Introduces the four menu categories (monitor, enforce, explore, configure), subscription differences between ITD and ITP, user roles, permissions, and threat mitigation capabilities.
|
| トピック 7 | - User Assessment: Examines user attributes, differences between users
- endpoints
- entities, risk baselining, risky account types, elevated privileges, watchlists, and honeytoken accounts.
|
| トピック 8 | - Risk Assessment: Covers entity risk categorization, risk and event analysis dashboards, filtering, user risk reduction, custom insights versus reports, and export scheduling.
|
| トピック 9 | - Multifactor Authentication (MFA) and Identity-as-a-service (IDaaS) Configuration Basics: Focuses on accessing and configuring MFA and IDaaS connectors, configuration fields, and enabling third-party MFA integration.
|
| トピック 10 | - Configuration and Connectors: Addresses domain controller monitoring, subnet management, risk settings, MFA and IDaaS connectors, authentication traffic inspection, and country-based lists.
|
| トピック 11 | - Falcon Fusion SOAR for Identity Protection: Explores SOAR workflow automation including triggers, conditions, actions, creating custom
- templated
- scheduled workflows, branching logic, and loops.
|