Authentication Protocols
PAP, NTLM, Kerberos, and the sorts
PAP, NTLM, Kerberos, and the sorts
Security issues on each side
Backup Types and Considerations
Large-scale parallel and distributed systems
Hierarchical and decentralized naming system
Real-world Disaster Recovery
Protecting email accounts and systems
Specialized computing systems with specific functions
Security Information and Event Management
Firewalls - Its uses and types
High Availability and Disaster Recovery
Securing hardware memory and interfaces
SSO,, OAuth, SAML, and OIDC
Intrusion Detection and Intrusion Prevention
Selecting Infrastructure Controls
The different types of mobile communications systems
Physical, logical, and secure ports
Securing on-premise datacenters
Different types of secure architectures
The OWASP Top 10 is a standard awareness document for developers and web application security.
Physical, logical, and secure ports
Redundant Array of Independent Disks
Securing the network infrastructure
Security Design Principles
Security Design Principles
Security Design Principles
Transport Layer Security and IP Security
Extending a private network over a public one
wireless Networking
Securing wireless infrastructure