AAA of Security
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting
Software acquired from vendors
The different agreement types you'll encounter when working in Cybersecurity
Securing software applications
Confidentiality, Integrity, and Availability
Static, Dynamic, and Test Coverage
Examining the source code
COBIT, ISO 27001, NIST 800-53, etc.
The ISC2 Code of Ethics
Security Risks in Software Development
Understanding of potential threats
Common security policies
Policies, procedures, and controls
Software Testing in Development
Summary of cybersecurity terms