- How to select controls based on system security requirements
- Use of confidentiality models such as Bell-LaPadula
- How to identify integrity models such as Biba and Clark-Wilson
- Common flaws and security issues associated with security architecture designs
- Cryptography and how it is used to protect sensitive information
- The need for and placement of physical security control