1 | Cybersecurity Fundamentals |
2 | Foundations of Cryptology |
3 | Network Security and Protocols |
4 | Application Security and Vulnerabilities |
5 | Identity and Access Management |
6 | Security in Cloud Computing |
7 | Data Encryption and Hashing Algorithms |
8 | Intrusion Detection and Prevention Systems |
9 | Ethical Hacking and Penetration Testing |
10 | Compliance and Legal Issues in Cybersecurity |
11 | Risk Management and Disaster Recovery |
12 | Emerging Threats and Future Trends in Cybersecurity |
13 | Incident Response and Forensics |
14 | Cyber Attack Use Cases |