Chapter 1: Governance and compliance
- Module A: Security governance
- Module B: Regulatory compliance
- Module C: Standards and frameworks
Chapter 2: Security policies
- Module A: Policy design
- Module B: Controls and procedures
- Module C: Training and coordination
Chapter 3: Risk management
- Module A: Risk assessment
- Module B: Risk management strategies
Chapter 4: Enterprise resilience
- Module A: BCDR planning
- Module B: Resilient architecture
Chapter 5: Threat management
- Module A: Threats and vulnerabilities
- Module B: Threat intelligence sources
- Module C: Applied intelligence
Chapter 6: Cryptographic techniques
- Module A: Cryptographic principles
- Module B: Ciphers and hashes
Chapter 7: Applied cryptography
- Module A: Public key infrastructure
- Module B: Cryptographic protocols
Chapter 8: Authentication and authorization
- Module A: Access control components
- Module B: Authentication technologies
Chapter 9: Network security architecture
- Module A: Network vulnerabilities
- Module B: Network security infrastructure
- Module C: Secure network configuration
Chapter 10: Protecting hosts and data
- Module A: Host security
- Module B: Data security
Chapter 11: Threat detection and response
- Module A: Threat detection systems
- Module B: Network sensors
- Module C: Data analysis
Chapter 12: Specialized system security
- Module A: Mobile device security
- Module B: Operational technologies
Chapter 13: Virtual and cloud infrastructure
- Module A: Virtual and cloud systems
- Module B: Secure cloud infrastructure
Chapter 14: Secure applications
- Module A: Software assurance
- Module B: Application vulnerabilities
Chapter 15: Security assessment and testing
- Module A: Security testing programs
- Module B: Vulnerability assessments
- Module C: Vulnerability and patch management
Chapter 16: Incident response
- Module A: Incident response planning
- Module B: Incident response procedures
- Module C: Digital forensics