Table of Contents
- Basics of Information Security
- Threat Paradigm
- Information Security Controls
- Decoding Policies Standards Procedures & Guidelines
- Network security design
- Know your assets
- Implementing Network Security
- Secure Change Management
- Vulnerability and Risk Management
- Access Control
- Capacity Management
- Log Management
- Network Monitoring
- Information Security Audit
- Technical Compliance Audit
- Penetration Testing