Volume 2 – General User
2. Social Media
6. Protection of Personal Computer
7 . Wireless Network
8. Fraud Prevention from the Internet
9. Information Rights Management
10. Cryptography
Volume 2 – IT Professional
4. Security Management and Operations
6. Secure Application Development
9. IP Traceback
11. Data Protection / Data Centric Security
Volume 1 – General User
1. IS Update
5. Business Continuity Management
6. Information Security Management
11. Security Risks for Web Application
12. Security Incident Management
16. Compliance
Volume 1 – IT Professional
7. Firewall
10. Digital Forensic
Training Series One : Information Security and Challenges
1. Information Security and Challenges
2. Information Security in Universities
4. Information Security Incident Management
Training Series Two : Data Handling in University
1. Human Factor in Information Security
2. Case Study – Information Security in University
3. Information Classification and Handling
4. Business Impact Analysis (“BIA”)
Training Series Three : Information Security – Perspective for Management
1. Information Security Management & Change Management
3. Business Impact Analysis and Business Continuity Management
4. Evaluation of IS Control and Self Assessment
Training Series Four : End User Security Evaluation of IS Controls & Self-Assessment
1. Information Security – Trends and Countermeasures
3. Portable Storage Media and Internet Storage Handling