01. Module Intro
02. Configuration Management
03. Diagrams
04. Baseline Configuration
05. IP Address Schema
06. Data Sovereignty
07. Data Loss Prevention (DLP)
08. Types of Data to Secure
09. Data Masking
10. Tokenization
11. Digital Rights Management (DRM)
12. Hardware Based Encryption (TPM and HSM)
13. Geographical Considerations
14. Cloud Access Security Broker (CASB)
15. Security-as-a-Service (SECaaS)
16. Differences between CASB and SECaaS
17. Recovery
18. Secure Protocols and SSL-TLS Inspection
19. Hashing
20. API Considerations and API Gateways
21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites)
22. Disaster Area Example
23. Honeypots and Honeyfiles
24. Honeynets
25. Fake Telemetry
26. DNS Sinkhole