| 1.00 | Understand threats, attacks and vulnerabilities. | 40% | B2 Understand Conceptual |
| 1.01 | Analyze indicators of compromise and determine the type of malware. | 9% | - |
| 1.02 | Compare types of attacks. | 7% | - |
| 1.03 | Explain threat actor types and attributes. | 6% | - |
| 1.04 | Explain penetration testing concepts. | 6% | - |
| 1.05 | Explain vulnerability scanning concepts. | 6% | - |
| 1.06 | Explain the impact associated with types of vulnerabilities. | 6% | - |
| 2.00 | Understand technologies and tools. | 30% | B2 Understand Conceptual |
| 2.01 | Install and configure network components, both hardware and software based, to suport organizational security. | 7% | - |
| 2.02 | Use appropriate software tools to assess the security posture of an organization. | 4% | - |
| 2.03 | Troubleshoot common security issues. | 3% | - |
| 2.04 | Analyze and interpret output form security technologies. | 5% | - |
| 2.05 | Deploy mobile devices securely. | 6% | - |
| 2.06 | Implement secure protocols. | 5% | - |
| 3.00 | Understand architecture and design. | 30% | B2 Understand Conceptual |
| 3.01 | Explain use cases and purpose for frameworks, best practices and secure configuration guides. | 4% | - |
| 3.02 | Implement secure network architecture concepts. | 3% | - |
| 3.03 | Implement secure systems design. | 3% | - |
| 3.04 | Explain the importance of secure staging deployment concepts. | 4% | - |
| 3.05 | Explain the security implications of embedded systems. | 4% | - |
| 3.06 | Understand secure application development and deployment concepts. | 3% | - |
| 3.07 | Understand cloud and vitualization concepts. | 3% | - |
| 3.08 | Explain how resiliency and automation strategies reduce risk. | 3% | - |
| 3.09 | Explain the importance of physical security controls. | 3% | - |