-
I Access Control
- Identity, Authentication, Authorisation, Accounting
- Access Control Models
- Administration
- Controls
- Monitoring and practices
- Threats
-
II Software Development Security
- programming
- development
- databases
- webapp security
- malware
-
III Business Continuity and DR
- BCP Planning
- BCP Project
- Recovery strategy
- Technology Recovery
- Testing and Maintenance
-
IV Cryptography
- history
- encryption systems
- message integrity
- key management and pki
- usage
- attacks
-
V Information Security Governance
- definitions
- governance
- organisation
- risk management
- information classification
-
VI Legal, Regulations and Investigation
- laws and regulations
- liability
- incident response
- investigation
- ethics
-
VII Operational Security
- administration management
- system hardening
- config management
- infrastructure resilience
- media controls and backups
- vulnerability testing
-
VIII Physical and Environmental Security
- site design
- internal support systems
- planning
- fire
- perimeter security
-
IX Security Architecture and Design
- computer architecture
- security models
- frameworks
- evaluation criteria
- certification and accredation
- threats
-
X Telecommunications and Network
- TCP/IP
- network protocols
- WiFi and Mobiles
- Routers and Firewalls
- LAN, WAN
- VPNs