Skip to main content

Topic outline

  • How to join the Interactive Live Session?

    Once you've entered the required information, click on the link below (visible after registration) & "Join" or "Enter" button. This will take you to the virtual meeting room. "Join Session" button will appear when session starts. 

  • Module 1: Security Principles

    1. The CIA Triad – Confidentiality, Integrity, Availability
    2. IAAA - Identification, Authentication, Authorization, and Accountability
    3. Privacy
    4. Risk Management
    5. Access Control Categories
    6. Ethics of Organization and ISC2
    7. Governance Vs Management
    8. Laws & Regulations
    9. Security Governance Principles



  • Module 2: Business Continuity

    1. Incident Terminologies
    2. Business Continuity Planning BCP
    3. Disaster Recovery Planning DRP
    4. Incidents Response


  • Module 3: Access Controls Concepts

    1. Physical Security Controls
    2. Monitoring
    3. Authorized vs Unauthorized personnel
    4. Principle of least privilege
    5. Segregation of duties
    6. Discretionary access control (DAC)
    7. Mandatory access control (MAC)
    8. Role-based access control (RBAC)


  • Module 4: Network Security

    1. Network Basics & Definitions
    2. The OSI Model
    3. The TCP/IP Model
    4. IP and MAC addresses, Port Numbers
    5. IP Support Protocols
    6. Cables
    7. LAN Topologies
    8. WIFI
    9. Wireless Networks
    10. VLANS and Routers
    11. VPN, NAC and third-party connectivity
    12. SDN, SD-WAN, and SDX
    13. Attacks and attackers
    14. Intrusion Detection and Prevention Systems (IDS-IPS)
    15. SIEM and SOAR Systems
    16. Honeynets and Honeypots
    17. Firewalls
    18. Zero-day attacks and exploits
    19. Vulnerability Scanning
    20. Virtualization, Cloud and Distributed Computing
    21. The Internet of Things IOT
    22. Fault tolerance, redundancy and resiliency
    23. Data Centers
    24. Secure Design Principles


  • Module 5: Security Management

    1. Configuration Management
    2. Patch Management
    3. Change Management
    4. Cryptography
    5. Hashing
    6. Attacks on Cryptography
    7. Data handling, Data Storage, and Data Retention
    8. Administrative (Directive)
    9. Training and Awareness
    10. Social Engineering Attacks