Chapter 1: Domain 1: Security risk management
Cornerstone Information Security Concepts
Information Security Governance
Access Control Defensive Categories and Types
Chapter 2: Domain 2: Asset security
Determining Data Security Controls
Chapter 3: Domain 3: Security engineering
Secure Operating System and Software Architecture
Virtualization and Distributed Computing
System Vulnerabilities, Threats, and Countermeasures
Cornerstone Cryptographic Concepts
Site Selection, Design, and Configuration
Chapter 4: Domain 4: Communication and network security
Network Architecture and Design
Secure Network Devices and Protocols
Chapter 5: Domain 5: Identity and access management (controlling access and managing identity)
Chapter 6: Domain 6: Security assessment and testing
Chapter 7: Domain 7: Security operations
Operational Preventive and Detective Controls
BCP and DRP overview and process
DRP Testing, Training, and Awareness
Chapter 8: Domain 8: Software development security
Application Development Methods