整理资料来源:
一、威胁,攻击和漏洞:
1.恶意软件:https://blog.csdn.net/tushanpeipei/article/details/120245151?spm=1001.2014.3001.5502
2.认识网络攻击:https://blog.csdn.net/tushanpeipei/article/details/120252183?spm=1001.2014.3001.5502
3.威胁情报:https://blog.csdn.net/tushanpeipei/article/details/120259530?spm=1001.2014.3001.5502
4.社会工程攻击:https://blog.csdn.net/tushanpeipei/article/details/120295919?spm=1001.2014.3001.5502
5.常见的网络攻击:https://blog.csdn.net/tushanpeipei/article/details/120300494?spm=1001.2014.3001.5502
6.了解漏洞的类型:https://blog.csdn.net/tushanpeipei/article/details/120332372?spm=1001.2014.3001.5502
7.漏洞扫描:https://blog.csdn.net/tushanpeipei/article/details/120335699?spm=1001.2014.3001.5502
8.渗透测试和安全练习:https://blog.csdn.net/tushanpeipei/article/details/120355122?spm=1001.2014.3001.5502
二、安全代码设计与实现:
1.软件开发周期:https://blog.csdn.net/tushanpeipei/article/details/120376214?spm=1001.2014.3001.5501
2.软件质量保证:https://blog.csdn.net/tushanpeipei/article/details/120376376?spm=1001.2014.3001.5501
3.应用程序攻击:https://blog.csdn.net/tushanpeipei/article/details/120382711?spm=1001.2014.3001.5501
4.安全编码实践:https://blog.csdn.net/tushanpeipei/article/details/120393719?spm=1001.2014.3001.5501
三、密码学设计与实现:
1.加密基础:https://blog.csdn.net/tushanpeipei/article/details/120398239?spm=1001.2014.3001.5501
2.对称密码学:https://blog.csdn.net/tushanpeipei/article/details/120405096?spm=1001.2014.3001.5501
3.非对称密码学:https://blog.csdn.net/tushanpeipei/article/details/120407412?spm=1001.2014.3001.5501
4.密钥管理:https://blog.csdn.net/tushanpeipei/article/details/120419680?spm=1001.2014.3001.5501
5.公钥基础设施:https://blog.csdn.net/tushanpeipei/article/details/120422914?spm=1001.2014.3001.5501
6.密码分析攻击:https://blog.csdn.net/tushanpeipei/article/details/120445165?spm=1001.2014.3001.5501
7.密码学应用:https://blog.csdn.net/tushanpeipei/article/details/120445768?spm=1001.2014.3001.5501
四、身份和访问管理的设计与实现:
1.身份证明:https://blog.csdn.net/tushanpeipei/article/details/120473042?spm=1001.2014.3001.5501
2.认证:https://blog.csdn.net/tushanpeipei/article/details/120474138?spm=1001.2014.3001.5501
3.授权:https://blog.csdn.net/tushanpeipei/article/details/120488276?spm=1001.2014.3001.5501
4.帐户管理:https://blog.csdn.net/tushanpeipei/article/details/120513376?spm=1001.2014.3001.5501
五、实体安全设计与实现:
1.数据中心防护:https://blog.csdn.net/tushanpeipei/article/details/120518159?spm=1001.2014.3001.5502
2.硬件与数据安全:https://blog.csdn.net/tushanpeipei/article/details/120521005?spm=1001.2014.3001.5502
3.业务连续性:https://blog.csdn.net/tushanpeipei/article/details/120521046?spm=1001.2014.3001.5502
4.灾后恢复:https://blog.csdn.net/tushanpeipei/article/details/120521065?spm=1001.2014.3001.5502
六、云安全设计与实现:
1.云计算:https://blog.csdn.net/tushanpeipei/article/details/120530948?spm=1001.2014.3001.5501
2.虚拟化:https://blog.csdn.net/tushanpeipei/article/details/120537362?spm=1001.2014.3001.5501
3.云计算构建模块:https://blog.csdn.net/tushanpeipei/article/details/120539140?spm=1001.2014.3001.5501
4.云计算参考架构:https://blog.csdn.net/tushanpeipei/article/details/120540906?spm=1001.2014.3001.5501
5.云安全控制:https://blog.csdn.net/tushanpeipei/article/details/120540939?spm=1001.2014.3001.5501
七、终端安全设计与实现:
1.主机安全:https://blog.csdn.net/tushanpeipei/article/details/120551144?spm=1001.2014.3001.5501
2.硬件安全:https://blog.csdn.net/tushanpeipei/article/details/120555391?spm=1001.2014.3001.5501
3.配置管理:https://blog.csdn.net/tushanpeipei/article/details/120559353?spm=1001.2014.3001.5501
4.嵌入式系统安全:https://blog.csdn.net/tushanpeipei/article/details/120559386?spm=1001.2014.3001.5501
5.脚本和命令行:https://blog.csdn.net/tushanpeipei/article/details/120559415?spm=1001.2014.3001.5501
八、网络安全设计与实现:
1.TCP/IP网络:https://blog.csdn.net/tushanpeipei/article/details/120569329?spm=1001.2014.3001.5501
2.安全网络设计:https://blog.csdn.net/tushanpeipei/article/details/120571766?spm=1001.2014.3001.5501
3.网络安全设备:https://blog.csdn.net/tushanpeipei/article/details/120572832?spm=1001.2014.3001.5501
4.安全网络技术:https://blog.csdn.net/tushanpeipei/article/details/120581131?spm=1001.2014.3001.5501
5.传输加密:https://blog.csdn.net/tushanpeipei/article/details/120582950?spm=1001.2014.3001.5501
6.无线网络:https://blog.csdn.net/tushanpeipei/article/details/120588348?spm=1001.2014.3001.5501
7.网络攻击:https://blog.csdn.net/tushanpeipei/article/details/120590554?spm=1001.2014.3001.5501
8.移动设备安全:https://blog.csdn.net/tushanpeipei/article/details/120591222?spm=1001.2014.3001.5501
9.网络工具:https://blog.csdn.net/tushanpeipei/article/details/120591354?spm=1001.2014.3001.5501
九、业务和事件响应:
1.事件响应方案:https://blog.csdn.net/tushanpeipei/article/details/120600551?spm=1001.2014.3001.5501
2.攻击框架:https://blog.csdn.net/tushanpeipei/article/details/120609104?spm=1001.2014.3001.5501
3.事件调查:https://blog.csdn.net/tushanpeipei/article/details/120610307?spm=1001.2014.3001.5501
4.取证技术:https://blog.csdn.net/tushanpeipei/article/details/120610391?spm=1001.2014.3001.5501
十、治理、风险和合规性:
#由于考试需要,涉及到几乎是欧美的政策。
1.风险分析:https://blog.csdn.net/tushanpeipei/article/details/120617399?spm=1001.2014.3001.5501
2.风险管理:https://blog.csdn.net/tushanpeipei/article/details/120620780?spm=1001.2014.3001.5501
3.供应链风险:https://blog.csdn.net/tushanpeipei/article/details/120625846?spm=1001.2014.3001.5501
4.安全政策:https://blog.csdn.net/tushanpeipei/article/details/120626731?spm=1001.2014.3001.5501
5.隐私和合规性:https://blog.csdn.net/tushanpeipei/article/details/120627398?spm=1001.2014.3001.5501
6.增强隐私保护的技术:https://blog.csdn.net/tushanpeipei/article/details/120627763?spm=1001.2014.3001.5501
7.安全意识和培训:https://blog.csdn.net/tushanpeipei/article/details/120628102?spm=1001.2014.3001.5501