Lesson 1: Securing Information
A: Examine Information Security
B: Implement Physical Security Measures
C: Examine Cyber Security
Lesson 2: Guarding Against Social Engineering Exploits
A: Identify Social Engineering Exploits
B: Counteract Social Engineering Exploits
C: Evolve Social Engineering Organization Policies
Lesson 3: Identifying Security Measures
A: Strengthen Desktop Security
B: Strengthen Software Security
C: Strengthen Browser Security
D: Strengthen Network Security
E: Secure Wireless Networks
F: Strengthen Mobile Security
Lesson 4: Maintaining File System Security
A: Implement File System Security in Windows
B: Back Up and Restore Data
C: Dispose of Data Securely
Lesson 5: Guarding Against Attacks
A: Protect a Computer from Security Threats
B: Protect Computers from Virus Attacks
C: Protect Computers from Social Network Threats
Lesson 6: Handling Security Breaches
A: Identify Incidents
B: Respond to Incidents
Lesson 7: Identifying Cloud Computing And Virtualization Security Methods
A: Fundamentals of Cloud Computing
B: Fundamentals of Virtualization
Appendix A: Security and Privacy Regulations