1. Adware
2. Securing a System
2.1. Authorisation Permissions
2.1.1. Access Control Lists
2.2. Backing Up & Restoring
2.3. Encrypting
2.4. Others
2.4.1. Biometrics
2.4.2. Physical Security
2.4.2.1. CCTV
2.4.2.2. Locks
2.5. Firewalls
2.6. Security Risk Levels
2.7. Software Protection
2.7.1. Anti-Virus
2.7.2. Intrusion Detection Systems
3. Business risks
3.1. Loss of service
3.2. loss of business or income eg through loss of customer records;
3.3. Loss of Service
3.4. Loss of Confidentiality
3.5. Compromised data integrity
3.6. Security Issues
3.6.1. Malware
3.6.2. Viruses
3.6.3. Trojans
3.6.4. Worms
3.6.5. Spyware
4. Directory services
4.1. account management
4.2. authentication management
4.3. active directory
4.4. DNS
5. Telecommunication services
5.1. communication
5.1.1. email
5.1.2. internet relay chat (IRC)
5.1.3. discussion boards
5.2. remote access
5.2.1. via mobiles
5.2.2. remote desktop
5.2.3. social networking
6. File services
6.1. File transfer
6.2. file sharing
7. Application Services
7.1. Application software
7.1.1. Database
7.1.2. Web
7.2. Proxy
7.3. Shared Resources
7.3.1. Printing
7.3.2. Storage Space
7.4. Voice Over IP (VoIP)
7.5. Authentication
7.5.1. Users
7.5.2. Hardware
7.6. Mobile Working
8. Leased line
9. Types of Network
9.1. local area network (LAN)
9.2. wide area network (WAN)
9.3. internet
9.4. WAN technologies
9.4.1. frame relay
9.4.2. MPLS
9.4.3. ATM
9.5. Personal Area Network (PAN)
9.6. logical and physical topologies
9.6.1. Star
9.6.2. Bus
9.6.3. Ring
9.6.4. Mesh
9.6.5. Tree
9.7. network access methods
9.7.1. CSMA
9.7.2. Token Passing
9.8. network models
9.8.1. OSI 7 Layer
9.8.2. TCP/IP
10. Network Protocols and Standards Technologies
10.1. TCP/IP
10.2. AppleTalk
10.3. UDP
10.4. 802.2
10.5. 802.3
10.6. FDDI
10.7. 802.5
10.8. wireless technologies
10.8.1. 802.11
10.8.2. Infrared
10.8.3. BlueTooth
10.8.4. 3G
10.8.5. factors affecting range and speed of wireless
11. Application Layer Protocols
11.1. DNS
11.2. DHCP
11.3. HTTP
11.4. FTP
11.5. SMTP
12. Key components
12.1. network devices
12.1.1. workstations
12.1.2. Servers
12.1.2.1. Print
12.1.2.2. Mail
12.1.2.3. File
12.1.2.4. Web
12.1.2.5. Proxy
12.1.3. NIC (Network Interface Card)
12.2. Interconnection Devices
12.2.1. Wireless Access Points
12.2.2. Switch
12.2.3. Wireless Access Point
12.2.4. Router
12.3. connectors and cabling
12.3.1. Dedicated line
12.3.2. Media Types
12.3.2.1. STP
12.3.2.2. UTP
12.3.2.2.1. Category 5
12.3.2.3. Coaxil
12.3.2.4. Fibre Optic
12.3.3. Wireless
12.3.4. Mobile technology
12.3.5. Cable/Connection Standards
12.4. Software
12.4.1. network operating system
12.4.2. Virus Checker
12.4.3. Firewall
12.4.4. Email Clients
12.5. Commercial systems
12.5.1. MAC OSX
12.5.2. Linux
12.5.3. Windows