• Physical security of IT infrastructure
  • Security in computer networks
  • Monitoring and protection of IT infrastructure
  • Protection, encryption, and data recovery
  • Computer forensics