Session 26 – Cybersecurity Fundamentals: Introduction to Cybersecurity
Session topics:

1.1 Overview
1.2 What is Security?
1.3 Types of Security
 Enrichment:

Session 27 – Cybersecurity Fundamentals: Cybersecurity and Privacy
Session topics:

1.4   Specialized Systems
1.5   Roles and Responsibilities
1.6   Governance, Risk Management and Compliance
1.7   Cybersecurity Governance
1.13   Privacy
1.14   Privacy vs. Security

Session 28 – Cybersecurity Fundamentals: Service Disruption and Cybersecurity
Session topics:

1.8   Resilience
1.9   Business Continuity and Disaster Recovery
1.10   Business Impact Analysis
1.11   Recovery Concepts

Session 29 – Cybersecurity Fundamentals: Threat Landscape
Session topics:

1.4   Specialized Systems
1.5   Roles and Responsibilities
1.6   Governance, Risk Management and Compliance
1.7   Cybersecurity Governance
1.13   Privacy
1.14   Privacy vs. Security

Session 30 – Cybersecurity Fundamentals: Cyberattacks
Session topics
:

2.5 Attack Attributes
2.6 Attack Process
2.7 Malware and Attacks

Session 31 – Cybersecurity Fundamentals: Risk Management
Session topics:

2.8 Risk Assessment
2.9 Supply Chain Considerations
2.10 Risk Management Life Cycle
2.11 Managing Risk
2.12 Using the Results of Risk Assessments

Session 32 – Cybersecurity Fundamentals: Securing Assets
Session topics:

3.1 Risk Identification, Standards, Frameworks and Industry Guidance
3.3.8 Endpoint Security
3.3.9 System Hardening
3.3.10 Logging, Monitoring and detection
3.3.13 Data Security

Session 33 – Cybersecurity Fundamentals: Security Architecture
Session topics:

3.2 Architecture, Models, and Frameworks

Session 34 – Cybersecurity Fundamentals: Security Controls
Session topics:

3.3 Security Controls (3.3.1 to 3.3.6)

Session 35 – Cybersecurity Fundamentals: Network Security
Session

topics:
3.3.7  Network Security

Session 36 – Cybersecurity Fundamentals: Application and Cloud Security
Session topics
:

3.3.11 Application Security
3.3.12 Cloud Security

Session 37 - Cybersecurity Fundamentals: Software Management and Encryption
Session topics:

3.3.14 Configuration Management
3.3.15 Change Management
3.3.16 Patch Management
3.3.17 Encryption Fundamentals, Techniques and Applications

Session 38 – Cybersecurity Fundamentals: Introducing Security Operations
Session topics:

4.1 Security Operations

Session 39  - Cybersecurity Fundamentals: Testing Technologies and Security Tools
Session Topics:

4.2 Tool and Technologies (Monitoring, Detection, Correlation)
4.4 Forensics

Session 40 – Cybersecurity Fundamentals: Handling Security Incidents
Session Topics:

4.3 Incident Handling