Introduction to subject, Assets, Risks, Threats, Vulnerabilities, CIA, cyber attack, social engineering, phishing
Hackers, Data breaches, Motivation of cyber criminals
Malicious software types such as viruses, worms and spyware
Authentication and authorization, security layers, password security
Evaluating risks, threats, vulnerabilities
Encryption, Public Key Infrastructure
Operating system security and network security
Introduction to OWASP and application security