1 | Build Standards and Compliance |
2 | Securing the Network Connection |
3 | User Access and System Integration |
4 | Bastion Hosts and Airgaps |
5 | Updating Systems and Patch Cycles |
6 | Monitoring and Parsing Logs |
7 | Monitoring and Alerting |
8 | Configuration Drift and Remediation |
9 | Certificate and Key Madness |
10 | Recap and Final Project |