• Unit 1: Confidentiality Integrity and privacy  - availability - access control - access control techniques -  authorization -authentication tokens  - Key Management - Kerberos - Hashes - APIs - API Gateway - API Life cycle management -API documentation standards - API management patterns - API security patterns - API authentication - protection against cyber threats

    Unit 2: Vulnerability Management - Vulnerability Framework - The Vulnerability Creation Process - General Architecture - Charter Development - Business Case - Asset Valuation Guide - VM Policies - Deployment Strategies - Basic Strategy - Risk-Based Strategy - Controlling Internal Vulnerabilities - Principles of Mitigation  -  vulnerability assessment - Nessus - NMAP - Pen testing - Tools.

    Unit 3: Standards - Common Vulnerabilities and Exposure, Common Vulnerability Scoring System, - National Vulnerability Database (NVD) - Common Platform Enumeration - Security Content Automation Protocol - Trusted Automated exchange of indicator information - OWASP Application security verification standard - Payment Card Industry  - PCI compliance - HIPAA - HIPAA compliance

    Unit 4: Discovery Reports - Scheduling - Evaluation Reports - Profile Reports -Audit Reports -Audit Trend Analysis -Vulnerability Trend Report -Network Risk Trend Report - Compliance reports

    Unit 5:  IT Systems - System components - ITIL / ITSM process- Components/Elements of a Service - Service definition - configuration management - Infrastructure as code - versions - patch management - tools like Ansible - Chef - IT Service catalog - Self service - Request management - Incident management - knowledge management - problem management - Service level agreement  management -  Vendor management - Change management.