Module 1: Explore various business and industry influences along with their associated security risks
Module 2: Compare various critical security and privacy policies and procedures that represent organisational requirements
Module 3: Execute risk mitigation strategies and controls in a given scenario
Module 4: Analyse different risk metric situations for enterprise security
Module 5: Explore integration of network and security components, concepts, and architectures
Module 6: Explore integration of security controls for host devices to meet security requirements
Module 7: Analyze ways to integrate security controls for mobile and small form factor devices to meet security requirements
Module 8: Investigate security controls in various application vulnerability scenarios
Module 9: Explore enterprise security operations and methods for conducting effective security assessments
Module 10: Implement incident response and recovery procedures in various scenarios
Module 11: Integrate hosts, storage, networks, and applications into a secure enterprise
Module 12: Integrate cloud and virtualization technologies into a secure enterprise architecture
Module 13: Integrate and troubleshoot advanced authentication and authorization technologies in support of enterprise security initiatives and goals
Module 14: Implement various cryptographic techniques in different scenarios
Module 15: Deploy appropriate controls to secure communications and collaboration solutions
Module 16: Understand the importance of applying research methods to determine industry trends and their impact on the enterprise
Module 17: Survey security activities across the technology and software development life cycles
Module 18: Explore interaction across diverse business units to achieve security goals