Topics:
• Information Asset Security and Control
• Information Asset Security Frameworks, Standards, and Guidelines 
• Privacy Principles
• Physical Access and Environmental Controls
• Identity and Access Management
• Network and End-point Security
• Data Classification
• Data Encryption and Encryption-related Techniques
• Public Key Infrastructure (PKI)
• Web-based Communication Technologies
• Virtualized Environments 
• Mobile, Wireless, and Internet-of-Things (IOT) Devices
• Security Awareness Training and Programs
• Information System Attack Methods and Techniques
• Security Testing Tools and Techniques
• Security Monitoring Tools and Techniques
• Incident Response Management
• Evidence Collection and Forensics