Useful Links
Computer Science
Cybersecurity
Network Security and Defense
1. Introduction to Network Security
2. Foundational Networking Concepts
3. Threat Landscape Analysis
4. Network Perimeter Security
5. Secure Network Design and Architecture
6. Securing Network Communications
7. Wireless Network Security
8. Access Control and Authentication
9. Network Monitoring and Incident Response
10. Security Policies and Compliance
11. Advanced and Emerging Topics
Security Policies and Compliance
Security Policy Development
Policy Framework Design
Policy Hierarchy Structure
Governance Model
Approval Processes
Review and Update Cycles
Acceptable Use Policy
Resource Usage Guidelines
Prohibited Activities
Monitoring and Enforcement
Violation Consequences
Password Policy
Complexity Requirements
Length and Composition
Expiration and History
Account Lockout Procedures
Remote Access Policy
VPN Usage Guidelines
Device Security Requirements
Authentication Standards
Data Protection Measures
Incident Response Policy
Response Team Roles
Escalation Procedures
Communication Protocols
Recovery Objectives
Risk Management Framework
Asset Management
Asset Inventory Systems
Asset Classification
Asset Valuation Methods
Ownership Assignment
Vulnerability Management
Vulnerability Assessment Tools
Scanning Methodologies
Patch Management Processes
Remediation Prioritization
Threat Assessment
Threat Intelligence Sources
Threat Modeling Techniques
Attack Vector Analysis
Threat Landscape Monitoring
Risk Analysis
Qualitative Risk Assessment
Quantitative Risk Assessment
Risk Matrix Development
Risk Treatment Options
Security Testing and Assessment
Penetration Testing
Testing Methodologies
Scope Definition
Testing Phases
Reporting Standards
Vulnerability Scanning
Automated Scanning Tools
Manual Testing Techniques
Scan Result Analysis
Remediation Tracking
Security Audits
Audit Planning
Control Testing
Finding Documentation
Corrective Action Plans
Regulatory Compliance
Payment Card Industry DSS
Cardholder Data Protection
Network Security Requirements
Access Control Measures
Monitoring and Testing
Health Insurance Portability and Accountability Act
Administrative Safeguards
Physical Safeguards
Technical Safeguards
Breach Notification Requirements
General Data Protection Regulation
Data Protection Principles
Lawful Basis for Processing
Individual Rights
Data Breach Notification
ISO 27001 Framework
Information Security Management System
Risk Assessment Requirements
Control Implementation
Certification Process
Previous
9. Network Monitoring and Incident Response
Go to top
Next
11. Advanced and Emerging Topics