Cornerstone Information Security Concepts
Information Security Governance
Access Control Defensive Categories and Types
Chapter 3: Domain 2: Asset Security (Protecting Security of Assets)
Determining Data Security Controls
Chapter 4: Domain 3: Security Engineering (Engineering and Management of Security)
Evaluation Methods, Certification and Accreditation
Secure Operating System and Software Architecture
Virtualization and Distributed Computing
System Vulnerabilities, Threats and Countermeasures
Cornerstone Cryptographic Concepts
Site Selection, Design, and Configuration
Chapter 5: Domain 4: Communication and Network Security (Designing and Protecting Network Security)
Network Architecture and Design
Secure Network Devices and Protocols
Chapter 6: Domain 5: Identity and Access Management (Controlling Access and Managing Identity)
Operational Preventive and Detective Controls
BCP and DRP Overview and Process
DRP Testing, Training and Awareness
Application Development Methods
Object-Oriented Design and Programming