1. OVERVIEW OF INFORMATION SECURITY
2. INFORMATION AND NETWORK SECURITY POLICIES
3. CRYPTOGRAPHY AND PKI
4. NETWORK SECURITY APPLICATIONS
5. DESIGN PRINCIPLES
6. COMPLIANCE EVALUATION SYSTEM AND LAW
7. MALICIOUS LOGIC AND ATTACKS
8. VULNERABILITY ANALYSIS AND IT AUDIT
9. INTRUSION DETECTION AND LOG ANALYSIS
LAB WORK -ISA
SOLVED PRACTICE QUESTIONS
PRACTICAL EXERCISE - DLP AND SIEM TOOLS
1. PERFORM A PRACTICAL ANALYSYS ON ANY ONE DLP AND SIEM TOOLS