📄️ Security Design
Security Design Principles
📄️ Security Models
Security Design Principles
📄️ Security Requirements
Security Design Principles
📄️ Distributed Computing Models
Large-scale parallel and distributed systems
📄️ On-Premise Architecture
Securing on-premise datacenters
📄️ Other Technologies
Different types of secure architectures
📄️ HA and DR
High Availability and Disaster Recovery
📄️ DR in the Real-world
Real-world Disaster Recovery
📄️ RAID
Redundant Array of Independent Disks
📄️ Data Backups
Backup Types and Considerations
📄️ Authentication Protocols
PAP, NTLM, Kerberos, and the sorts
📄️ Identity Federation
SSO,, OAuth, SAML, and OIDC
📄️ Securing the Network
Securing the network infrastructure
📄️ Infrastructure Controls
Selecting Infrastructure Controls
📄️ Virtual Private Network
Extending a private network over a public one
📄️ TLS and IPSec
Transport Layer Security and IP Security
📄️ Firewalls
Firewalls - Its uses and types
📄️ IDS and IPS
Intrusion Detection and Intrusion Prevention
📄️ Embedded Systems
Specialized computing systems with specific functions
📄️ Mobile Systems
The different types of mobile communications systems
📄️ Wireless Security
Securing wireless infrastructure
📄️ DNS and Web Security
Hierarchical and decentralized naming system
📄️ Email Security
Protecting email accounts and systems
📄️ Hardware Security
Securing hardware memory and interfaces
📄️ Client and Server Security
Security issues on each side
📄️ Evolution of Security
Security Information and Event Management
📄️ OWASP Top Ten
The OWASP Top 10 is a standard awareness document for developers and web application security.