1- Cybersecurity kill chain and process for each steps with the defense strategies. 2- OSI model layers, Traffic flow, and associated attacks. 3- initial response for any type of security activity (FP,TP,TN,FN). 4- Security controls design and best practices. 5- Data encryption and masking on all levels (DB, Data in transit, movable devices). 6- Security and system logs activity and most important of logs type in (IIS,WAF,WF,EDR etc...) "integrate systems with the syslog" 7- NCA operational security controls and how to achieved. 8- wireless security and port authentication. 9- SD-WAN and IPsec Tunneling: Overview, Types, and How They Work. 10- DNS security protocols and how it's works.
Provision: Anything :)