To provide a base from which candidates can specialize further. Content include the threat environment, cryptography, protocols, technical security, attack tools, management and solutions.