Cybersecurity Roles, Processes and Operating System Security It has following 4 sub-modules… People processes and technology Examples and principles of CIA triad Operating System Security Basics Overview of Virtualization