Titanium Training CenterFuture WavePartner Logo

CCT

195,000 IQD
Lecture : 8

! انضم الآن وابدأ رحلتك معنا

1

Chapter 1 — Foundations of Information Security

  • 1.1 Security goals: Confidentiality, Integrity, Availability (CIA).
  • 1.2 Security models and principles (least privilege, defense in depth).
  • 1.3 Policies, standards, and governance.
  • 1.4 Risk assessment fundamentals and threat modeling.
2

Chapter 2 — Network Security Basics

  • 2.1 Network Layering and Segmentation
  • 2.2 Common network threats (spoofing, sniffing, MITM).
  • 2.3 Firewalls, IDS/IPS fundamentals.
  • 2.4 Secure network design and perimeter controls.
3

Chapter 3 — Security Controls in Depth

  • 3.1 Administrative controls (policies, awareness).
  • 3.2 Technical controls (access control, MFA, encryption).
  • 3.3 Physical controls (facility, hardware protection).
  • 3.4 Control selection & mapping to risks.
4

Chapter 4 — Security in Practice

  • 4.1 Hardening systems (OS, services).
  • 4.2 Patch management and secure configuration.
  • 4.3 Endpoint protection and monitoring.
  • 4.4 Secure operational procedures and logging.
5

Chapter 5 — Application, Cloud, and Emerging Technologies

  • 5.1 Secure SDLC basics and common application flaws.
  • 5.2 Cloud security fundamentals (IaaS/PaaS/SaaS considerations).
  • 5.3 Container and virtualization security concepts.
  • 5.4 Emerging tech risks (IoT, serverless).
6

Chapter 6 — Protecting Data & Communication

  • 6.1 Cryptography basics (symmetric/asymmetric).
  • 6.2 TLS, VPNs, secure email.
  • 6.3 Data classification, data-at-rest and data-in-transit protection.
  • 6.4 Key management basics.
7

Chapter 7 — Incident Response & Beyond

  • 7.1 Incident response lifecycle (prepare, detect, contain, eradicate, recover).
  • 7.2 Forensics basics and evidence handling.
  • 7.3 Post-incident lessons, reporting, and improvement.
  • 7.4 Business continuity and disaster recovery overview.