Table of Contents

1. Introduction to Security and Privacy Principles
2. Governance Structure and Policy
3. Risk Assessment and Compliance Standards
4. Introduction to System Scope
5. System Categorization and Control
6. Introduction to Control Selection and Approval
7. Evaluating and Selecting Controls
8. Enhancing Security Controls
9. Introduction to Implementing Controls
10. Deploying Security and Privacy Controls
11. Documenting Security Controls
12. Introduction to Control Assessment and Audit
13. Conducting Assessment and Audit
14. Developing Report and Risk Response
15. Introduction to System Compliance
16. Determining System Risk Posture
17. Documenting System Compliance
18. Introduction to Compliance Maintenance
19. Monitoring Compliance
20. Optimizing Risk and Compliance
21. Practice Tests