📄️ Authentication Protocols
PAP, NTLM, Kerberos, and the sorts
📄️ Identity Federation
SSO,, OAuth, SAML, and OIDC
📄️ Infrastructure Controls
Selecting Infrastructure Controls
📄️ Virtual Private Network
Extending a private network over a public one
📄️ TLS and IPSec
Transport Layer Security and IP Security
📄️ Firewalls
Firewalls - Its uses and types
📄️ IDS and IPS
Intrusion Detection and Intrusion Prevention
📄️ Embedded Systems
Specialized computing systems with specific functions
📄️ Mobile Systems
The different types of mobile communications systems
📄️ Wireless Infrastructure Security
Securing wireless infrastructure
📄️ Wireless Security Settings
Key security protocols and settings include WPA3, AAA, RADIUS, and EAP.
📄️ DNS and Web Security
Hierarchical and decentralized naming system
📄️ Email Security
Protecting email accounts and systems
📄️ Hardware Security
Securing hardware memory and interfaces
📄️ Client and Server Security
Security issues on each side