Authentication Protocols
PAP, NTLM, Kerberos, and the sorts
IEEE Standards
Relevant IEEE standards for cybersecurity and networking.
Infrastructure Controls
Selecting Infrastructure Controls
Virtual Private Network
Extending a private network over a public one
TLS and IPSec
Transport Layer Security and IP Security
Firewalls
Firewalls - Its uses and types
IDS and IPS
Intrusion Detection and Intrusion Prevention
Embedded Systems
Specialized computing systems with specific functions
Mobile Systems
The different types of mobile communications systems
Wireless Infrastructure Security
Securing wireless infrastructure
Wireless Security Settings
Key security protocols and settings include WPA3, AAA, RADIUS, and EAP.
DNS and Web Security
Hierarchical and decentralized naming system
Email Security
Protecting email accounts and systems
Hardware Security
Securing hardware memory and interfaces
Client and Server Security
Security issues on each side