Covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.
- Network Security
- Compliance and Operational Security
- Threats and Vulnerabilities
- Explain the importance of application security
- Access Control and Identity Management