OverView
Week 1 (Ch 1–3)
– Chapter 1: Security Governance Through Principles and Policies
– Chapter 2: Personnel Security and Risk Management Concepts
– Chapter 3: Business Continuity Planning
Week 2 (Ch 4–6)
– Chapter 4: Laws, Regulations, and Compliance
– Chapter 5: Protecting Security of Assets
– Chapter 6: Cryptography and Symmetric Key Algorithms
Week 3 (Ch 7–9)
– Chapter 7: PKI and Cryptographic Applications
– Chapter 8: Principles of Security Models, Design, and Capabilities
– Chapter 9: Security Vulnerabilities, Threats, and Countermeasures
Week 4 (Ch 10–12)
– Chapter 10: Physical Security Requirements
– Chapter 11: Secure Network Architecture and Securing Network Components
– Chapter 12: Secure Communications and Network Attacks
Week 5 (Ch 13–15)
– Chapter 13: Managing Identity and Authentication
– Chapter 14: Controlling and Monitoring Access
– Chapter 15: Security Assessment and Testing
Week 6 (Ch 16–17)
– Chapter 16: Managing Security Operations
– Chapter 17: Preventing and Responding to Incidents
Week 7 (Ch 18–19)
– Chapter 18: Disaster Recovery Planning
– Chapter 19: Investigations and Ethics
Week 8 (Ch 20–21 + wrap-up)
– Chapter 20: Software Development Security
– Chapter 21: Malicious Code and Application Attacks
– Use any remaining time for review and practice questions