1. Domain 5 Overiew and Key Security concepts
2. Cyber Security frameworks
3. HR and Information Security
4. Data lifecycle and media disposal
5. Physical Security Part 1
6. Physical Security Part 2
7. Logical Threats - Malware and Attacks
8. AAA Overview
9. Authentication - a deeper look
10. MFA and Securing bio-metric authentication from attacks
11. Authorization and Accounting - SIEM and SSO
12. Network Security controls and services - Part 1
13. Network Security controls and services - Part 2
14. Cryptography overview
15. Symmetric Encryption overview
16. ASymmetric Encryption overview
17. Public Key Infrastructure overview
18. Hashing and Digital Signature
19. Application of Encryption