Contents include:
- Common types of physical threats
- Common types of electrical threats and consequences
- Methods of providing physical access, security and electronic access to ICT systems.
- Security vulnerabilities associated with remote access technologies
- Cryptographic algorithms
- Methods of attacking password protected systems
- Operation of Public Key Infrastructure (PKI)
- Concepts of the Key Management and Certificate lifecycles
- and more