1. Basics of information security
  2. Threat paradigm
  3. Information security controls
  4. Decoding policies standards procedures & guidelines
  5. Network security design
  6. Know your assets
  7. Implementing network security
  8. Secure change management
  9. Vulnerability and risk management
  10. Access control
  11. Capacity management
  12. Log management
  13. Network monitoring
  14. Information security Audit
  15. Technical compliance Audit
  16. Penetration testing