| 1.00 | Understand identity and access management. | 40% | B2 Understand Conceptual |
| 1.01 | Compare identity and access management concepts | 7% | - |
| 1.02 | Install and configure identity and access services. | 11% | - |
| 1.03 | Implement identity and access management controls. | 11% | - |
| 1.04 | Differentiate common account management practices. | 11% | - |
| 2.00 | Understand risk management | 30% | B2 Understand Conceptual |
| 2.01 | Explain the importance of policies, plans, and prodedures related to organizational security. | 4% | - |
| 2.02 | Summarize business impact analysis concepts. | 3% | - |
| 2.03 | Explain risk management processes and concepts. | 3% | - |
| 2.04 | Follow incident response procedures. | 5% | - |
| 2.05 | Summarize basic concepts of forensics. | 3% | - |
| 2.06 | Explain disaster recovery and continuity of operation concepts. | 4% | - |
| 2.07 | Compare various types of controls. | 3% | - |
| 2.08 | Carry out data security and privacy practices. | 5% | - |
| 3.00 | Understand Cryptography and PKI. | 30% | B2 Understand Conceptual |
| 3.01 | Compare basic concepts of cryptography. | 7% | - |
| 3.02 | Explain cryptography algorithms and their basic characteristics. | 7% | - |
| 3.03 | Install and configure wireless security settings. | 8% | - |
| 3.04 | Implement public key infrastructure. | 8% | - |