OverView

Week 1 (Ch 1–3) – Chapter 1: Security Governance Through Principles and Policies – Chapter 2: Personnel Security and Risk Management Concepts – Chapter 3: Business Continuity Planning Week 2 (Ch 4–6) – Chapter 4: Laws, Regulations, and Compliance – Chapter 5: Protecting Security of Assets – Chapter 6: Cryptography and Symmetric Key Algorithms Week 3 (Ch 7–9) – Chapter 7: PKI and Cryptographic Applications – Chapter 8: Principles of Security Models, Design, and Capabilities – Chapter 9: Security Vulnerabilities, Threats, and Countermeasures Week 4 (Ch 10–12) – Chapter 10: Physical Security Requirements – Chapter 11: Secure Network Architecture and Securing Network Components – Chapter 12: Secure Communications and Network Attacks Week 5 (Ch 13–15) – Chapter 13: Managing Identity and Authentication – Chapter 14: Controlling and Monitoring Access – Chapter 15: Security Assessment and Testing Week 6 (Ch 16–17) – Chapter 16: Managing Security Operations – Chapter 17: Preventing and Responding to Incidents Week 7 (Ch 18–19) – Chapter 18: Disaster Recovery Planning – Chapter 19: Investigations and Ethics Week 8 (Ch 20–21 + wrap-up) – Chapter 20: Software Development Security – Chapter 21: Malicious Code and Application Attacks – Use any remaining time for review and practice questions