Course Contents
Introduction
1.1 Introduction
1.2 Information security
1.3 Auditing
1.4 Security policies Part 1
1.4 Security policies Part 2
1.5 Compliance
1.6 Computer Crimes Part 1
1.6 Computer Crimes Part 3
1.7 Information Risk Management Part 1
1.7 Information Risk Management Part 2
1.7 Information Risk Management Part 3
1.7 Information Risk Management Part 4
1.7 Information Risk Management Part 5
1.8 Business Continuity Planning Part 1
1.8 Business Continuity Planning Part 2
1.8 Business Continuity Planning Part 3
1.9 Assessment
2.1 Introduction
2.2 Information Classification
2.3 Data Classification
2.5 Data Management
2.6 Data Policy
2.6 Data Policy Part 2
2.7 Asset Management
2.8 Data Security Controls
2.9 Assessment
3.1 Introduction
3.2 Security Engineering
3.3 Security Architecture Part 1
3.3 Security Architecture Part 2
3.5 Evaluation Criteria Part 1
3.5 Evaluation Criteria Part 2
3.6 System Security Architecture Part 1
3.6 System Security Architecture Part 2
3.6 System Security Architecture Part 3
3.6 System Security Architecture Part 4
3.7 Cryptography Terms Part 1
3.7 Cryptography Terms Part 2
3.7 Cryptography Terms Part 3
3.7 Cryptography Terms Part 4
3.8 Physical and Environmental Security Part 1
3.8 Physical and Environmental Security Part 2
3.9 Assessment
4.1 Introduction
4.2 Secure Network Architecture and Design Part 2
4.2 Secure Network Architecture and Design Part 3
4.2 Secure Network Architecture and Design Part 4
4.3 Networks Part 1
4.3 Networks Part 2
4.3 Networks Part 3
4.3 Networks Part 4
4.3 Networks Part 5
4.4 Assessment
5.1 Introduction
5.2 Identification, Authentication, and Authorization Part 1
5.2 Identification, Authentication, and Authorization Part 2
5.2 Identification, Authentication, and Authorization Part 3
5.2 Identification, Authentication, and Authorization Part 4
5.3 Access Control Types Part 1
5.3 Access Control Types Part 2
5.3 Access Control Types Part 3
5.4 Assessment
6.1 Introduction
6.2 Log Management
6.3 Testing
6.4 Audit
6.5 Assessment
7.1 Introduction
7.2 Investigation
7.3 Incident Management
7.4 Evidence
7.5 Computer Forensics
7.6 Security Operations Part 1
7.6 Security Operations Part 2
7.6 Security Operations Part 3
7.6 Security Operations Part 4
7.6 Security Operations Part 5
7.7 Recovery Part 1
7.7 Recovery Part 2
7.7 Recovery Part 3
7.7 Recovery Part 4
7.7 Recovery Part 5
7.8 Perimeter Security Part 1
7.8 Perimeter Security Part 2
7.9 Assessment
8.1 Introduction
8.2 System Environments
8.3 Programming Concepts
8.4 System Life Cycle and Systems Development Part 1
8.4 System Life Cycle and Systems Development Part 2
8.5 ObjectOriented Programming Part 1
8.5 ObjectOriented Programming Part 2
8.5 ObjectOriented Programming Part 3
8.6 Database and Data Warehousing Environments Part 1
8.6 Database and Data Warehousing Environments Part 2
8.6 Database and Data Warehousing Environments Part 3
8.6 Database and Data Warehousing Environments Part 4
8.7 Assessment