Control Fundamentals and Security Threats Network Protocols, Attacks, and Defenses Creating Secure Networks and Performing Security Assessments Network and System Security Mechanisms Remote Access and Wireless Security Authentication, Biometrics, and Security Controls Securing the IT Environment Cryptography and Public Key Infrastructures Securing Applications, Virtualized Environments, and Cloud Computing Business Continuity, Disaster Recovery, Security Training, and Forensics