Please enable JavaScript.
Coggle requires JavaScript to display documents.
Section 4: Security of Networks, Systems, Applications and Data (Network…
Section 4: Security of Networks, Systems, Applications and Data
Process Control
Risk
Risk Assessment
Risk Management
Risk Response
Risk Analysis
Risk Scenario
Vulnerability
Vulnerability Management
Vulnerability Scans
Types of Vulnerability
Vulnerability Assessment
Penetration Testing
Exploit Methods
Testing Guidelines
Frameworks
Phases
Network Security
Network Management
Types Of Network
LAN
WAN
Wireless Technologies
Wireless Network Protection
Wireless Security Standards
Ports and Protocol
Commonly Exploited Ports and Services
Voice Over Internet Protocol
Tunnelling
VPN Tunnelling
Remote Access
Remote Access Risk
Remote Access Control
LAN, WAN Security
Operating System Security
System Hardening Controls
Credentials and Privileges
Platform Hardening
Virtualization
Risks
Advantage
Disadvantage
Specialized Systems
Application Security
Software Development Life Cycle
Agile and DevOps Development Approaches
Development and Testing Environments
SDLC Testing and Review Phases
Security Risks
Security with SDLC
Additional Threats
Wireless Application Protocol
Data Security
Data Classification
Data Classification Process
Data Classification Requirements
Database Controls
Database Vulnerabilities
Database Security