1. The Threat Landscape
2. Threat Actors
3. Security Threats - Malware
4. Fileless Malware and how it is severe
5. Endpoint Protection Platforms - EPP as a Security Measure
6. An overview about key Cyber Attacks
7. Web Application Attacks
8. Social Engineering and attacking the Human factor
9. How Organizations counter the social engineering
10. What is the Security Controls
11. Examples for Security Controls
12. How to select the proper Security Control
13. What is Risk Management in Cyber Security
14. Risk Response Strategies