1.The Threat Evolution

2.How to prevent sophisticated attacks

3.Threat Detection

4.Responding to Threats

5.Security Operations

6.Techniques for Managing Integrated Threats

7. Vulnerability management 

8. Patch management 

9. System hardening

10. Privilege reduction

11. Attack surface reduction

12. Security awareness training

13. Intrusion Prevention

14. Endpoint Malware Protection

15. Security Operations

16. Security Audit

Each topic is covered in a two-hour meeting for a total of 32 hours.