Table of Contents 1. Threats, attacks, vulnerabilities 2. Architecture & Design 3. Implementation 4. Operations & Incident Response 5. Governance, Risk, Compliance References Combination of James “Prof.” Messer videos: