Table of Contents
- Information and Data Security Fundamentals
- Defining the Threat Landscape
- Laying a Foundation for Information and Data Security
- Information Security Risk Management
- Developing Your Information and Data Security Plan
- Continuous Testing and Monitoring
- Business Continuity/Disaster Recovery Planning
- Incident Response Planning
- Developing a Security Operations Center
- Developing an Information Security Architecture Program
- Cloud Security Considerations
- Zero Trust Architecture in Information Security
- Third-Party and Supply Chain Security

