Access Control Mechanisms and Their Types
Security Threats and Vulnerabilities
Security Attacks Overview
Authentication and Authorization Mechanisms
Password Management and Policies
System Hardening Techniques
Preventing Cyber-Attacks and Threats
Patch Management and Configuration Management
Information Systems (IS) Audit Principles
Vulnerability Assessment
Penetration Testing
Change Management in Security
Fundamentals of Disaster Recovery
Incident Handling and Response Procedures
IS Risk Concepts and Types
Risk Identification
Risk Assessment
Risk Response and Mitigation
Risk and Control Monitoring and Reporting