| Code | Topic | Material |
| M1 | The basis of security and user control | Download |
| M2 | Organizational information security policy | Download |
| M3 | Password-based authentication method | Download |
| M4 | To tokens based authentication methods | Download |
| M5 | Biometric authentication methods | Download |
| M6 | Identifiers management models | Download |
| M7 | Elements of trust paradigms | Download |
| M8 | Mandatory users management model | Download |
| M9 | Discretion users management model | Download |
| M10 | Role users management model | Download |
| M11 | Attributed User Management Model | Download |
| M12 | Managing users in the Windows operating system | Download |
| M13 | Linux operating system in the system users management | Download |
| M14 | User management in mobile phone operating systems | Download |
| M15 | Identification devices in physical protection | Download |
| M16 | Biometric means of personal identification | Download |
| M17 | User management control system controllers | Download |
| M18 | User management tools for physical protection | Download |
| M19 | Analysis and implementation of control systems for user management | Download |
| M20 | Choosing control systems for user management | Download |