Module 1: Computer Systems Security
Module 2: OS Hardening and Virtualization
Module 3: Application Security
Module 4: Network Design Elements and Network Threats
Module 5: Network Perimeter Security
Module 6: Securing Network Media and Devices
Module 7: Physical Security and Authentication Models
Module 8: Access Control Methods and Models
Module 9: Vulnerability and Risk Assessment
Module 10: Monitoring and Auditing
Module 11: Encryption and Hashing Concepts
Module 12: PKI and Encryption Protocols
Module 13: Redundancy and Disaster Recovery
Module 14: Policies, Procedures, and People
Arab Consulting & Development Corp.