40 - Risk Response
41 - Security Controls Overview
42 - The Organisational Security Architecture
43 - Types of Security Controls
44 - Control Objective and Control Testing
45 - Defens in Depth or layered defenses
46 - Owner and Custodian
47 - Risk Reporting and Monitoring
48 - Key Performance Indicators
49 - Key Risk Indicator
50 - Incident Response Overview
51 - Security Operation Center
52 - SIEM Solution Overview
53 - Endpoint Detection and Response and Network detection and response
54 - SOAR and XDR
55 - Vulnerability Assessment tools
56 - Endpoint Protection Practices
57 - Network Security Devices
58 - VPN Wireless IoT Security
59 - Disaster Recovery Plan
60 - Business Continuity Plan
61 - Data Backup
62 - Data Backup Types
63 - Change Management Process
64 - Types of Change requests
65 - Social Engineering Attacks
66 - Security Awareness Program as a Control