- General Security Concepts
- Access control models
- Authentication methods
- Reducing the risks of non-essential protocols
- Reducing the risks for various types of attacks
- Mitigating risks from malicious code
- Understanding authentication, auditing, accounting and identification
- Communications Security
- Types of remote access technologies
- R-mail security concepts
- Internet security concepts
- Directory security concepts
- File transfer protocols and concepts
- Wireless technologies and concepts
- Infrastructure Security
- Security concerns and concepts of various network devices
- Security concerns for various types of media
- Security topologies
- Intrusion detection
- Understanding security baselines
- Basics of Cryptography
- Different types of cryptographic algorithms
- How cryptography addresses various security concepts
- Understanding PKI (Public Key Infrastructure)
- Cryptographic standards and protocols
- Key Management and Certificate Lifecycles
- Operational/Organizational Security
- Concepts of physical security
- Disaster recovery planning
- Security supplications and business continuity
- Policies and procedures
- Concepts of privilege management
- Understanding forensics
- Risk identification
- Education and training of end users, executives and human resources
- Security documentation concepts
- Wrap-up: Course Recap, Q/A, and Evaluations