Introduction
Preparing for the exam
CHAPTER 1 Implement server hardening solutions
CHAPTER 2 Secure a Virtualization Infrastructure
CHAPTER 3 Secure a network infrastructure
CHAPTER 4 Manage Privileged Identities
CHAPTER 5 Implement threat detection solutions
CHAPTER 6 Implement workload-specific security
Index