1 - Domain Overiew and Key Security concepts
2 - Information Security vs Cybersecurity
3 - Understand Information System Architecture
4 - Cyber Threats 101
5 - Cyber Attacks Methods and Techniques DeepDive BONUS
6 - Security Vulnerabilities and How it can be Exploited
7 - Auditors Guide for Ethical Hacking Overview and How Penetration testing work
8 - Cybersecurity Frameworks
9 - Personnel Security and Protecting Organizations assets
10 - Data Classification and Data Life Cycle
11 - Physical Security and Environmental Protection Part 1
12 - Physical Security and Environmental Protection Part 2
13 - Malware and how to counter it
14 - Authentication Authorization and Accounting AAA
15 - Authentication
16 - Strong Authentication and Biometric based Authentication Factors
17 - Authorization and Accounting and Auditing
18 - Network Security controls and services Part 1
19 - Network Security controls and services Part 2
20 - Cryptography Basics
21 - Symmetric Encryption Overview
22 - Asymmetric Encryption Overview
23 - Public Key Infrastructure and Digital Certificate Overview
24 - Understand Hashing and Digital Signature
25 - The Encryption and Cryptography Use Cases