Access Controls
- Identification Authentication Authorisation & Accounting
- Logical Access Controls
- Implementing Authentication
- Access Control Models
- TCSEC, ITSEC & Common Criteria
Cryptography
- Public Key
- Confidentiality & Integrity
- Digital Signatures
- The Transmission Security
Malicious Code & Activity
- Viruses, Trojan’s, Worms & their characteristics
- Anatomy of an attack
- Hackers & Crackers
- Incident detection & prevention, tools & techniques
Monitoring & Analysis
- Security Auditing & Frameworks
- Vulnerability & Penetration Testing
- IDS and IPS & Firewalls
- Logging & Monitoring
Networks & Communications
- OSI & Networking Technologies
- TCP/IP & LAN based protocols
- Remote Access Protocols
- Wireless Security
Risk, Response & Recovery
- The Risk Management
- The Business Continuity Planning
- The Disaster Recovery Planning
- The Incident Response and Forensics
Security Operations & Administration
- Policies, Standards & Guidelines
- Change & Configuration Management
- The System Development Lifecycle
- The Security best practices