CIA Principles or CIA triad | Basics |
IAAA operation | Basics |
Some Important Security Concepts | Basics |
Kerberos | Basics |
Identity federation | Basics |
SSO (Single sign-on) | Basics |
Web Services Federation | Basics |
Biometrics Authentication | Basics |
Privileged Accounts | Basics |
Privileged Account and Session Management | Basics |
Privileged Account Monitoring | Basics |
Privileged Account Management Solutions | Basics |
Application Whitelisting | Basics |
User Onboarding | Basics |
User Termination & Role changes | Basics |
Access Controls & RBAC | Basics |
Access validation & Certification | Basics |
Segregation of Duties, Auditing and Reporting | Basics |
Identity Lifecycle Management (ILM) | Basics |
Intellectual property | Basics |
Data Classification | Basics |
Industry and local laws and regulations | Basics |
Security Policy Framework | Basics |
Data Breach and Incident Response Process | Basics |
Notifiable Data Breaches | Basics |