


CCT
195,000 IQD
Lecture : 8
! انضم الآن وابدأ رحلتك معنا
1
Chapter 1 — Foundations of Information Security
- 1.1 Security goals: Confidentiality, Integrity, Availability (CIA).
- 1.2 Security models and principles (least privilege, defense in depth).
- 1.3 Policies, standards, and governance.
- 1.4 Risk assessment fundamentals and threat modeling.
2
Chapter 2 — Network Security Basics
- 2.1 Network Layering and Segmentation
- 2.2 Common network threats (spoofing, sniffing, MITM).
- 2.3 Firewalls, IDS/IPS fundamentals.
- 2.4 Secure network design and perimeter controls.
3
Chapter 3 — Security Controls in Depth
- 3.1 Administrative controls (policies, awareness).
- 3.2 Technical controls (access control, MFA, encryption).
- 3.3 Physical controls (facility, hardware protection).
- 3.4 Control selection & mapping to risks.
4
Chapter 4 — Security in Practice
- 4.1 Hardening systems (OS, services).
- 4.2 Patch management and secure configuration.
- 4.3 Endpoint protection and monitoring.
- 4.4 Secure operational procedures and logging.
5
Chapter 5 — Application, Cloud, and Emerging Technologies
- 5.1 Secure SDLC basics and common application flaws.
- 5.2 Cloud security fundamentals (IaaS/PaaS/SaaS considerations).
- 5.3 Container and virtualization security concepts.
- 5.4 Emerging tech risks (IoT, serverless).
6
Chapter 6 — Protecting Data & Communication
- 6.1 Cryptography basics (symmetric/asymmetric).
- 6.2 TLS, VPNs, secure email.
- 6.3 Data classification, data-at-rest and data-in-transit protection.
- 6.4 Key management basics.
7
Chapter 7 — Incident Response & Beyond
- 7.1 Incident response lifecycle (prepare, detect, contain, eradicate, recover).
- 7.2 Forensics basics and evidence handling.
- 7.3 Post-incident lessons, reporting, and improvement.
- 7.4 Business continuity and disaster recovery overview.