AAA of Security
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting
Software acquired from vendors
The different agreement types you'll encounter when working in Cybersecurity
Securing software applications
Confidentiality, Integrity, and Availability
Static, Dynamic, and Test Coverage
Examining the source code
Laws protecting against computer crimes
COBIT, ISO 27001, NIST 800-53, etc.
GDPR, HIPAA,PCI DSS, etc.
Protecting the legal rights if creators and owners
The ISC2 Code of Ethics
Security Risks in Software Development
Understanding of potential threats
Common security policies
Policies, procedures, and controls
Software Testing in Development
GDPR, HIPAA,PCI DSS, etc.
Summary of cybersecurity terms