- Basics of information security
- Threat paradigm
- Information security controls
- Decoding policies standards procedures & guidelines
- Network security design
- Know your assets
- Implementing network security
- Secure change management
- Vulnerability and risk management
- Access control
- Capacity management
- Log management
- Network monitoring
- Information security Audit
- Technical compliance Audit
- Penetration testing