Application Security 18 What is SOC 2 Compliance? What is a DDoS Attack What is Application Security Testing What is Container Scanning? What is DSPM – Data Security Posture Management What Is Threat Modeling?
DevSecOps 8 What is Orchestration in Software Development? What is Secure Shell (What is SSH)? Mandatory Access Control (MAC): Strengthening Secure Access What is Data Leakage What is Open-Source Software Security What is DevOps?
Software Supply Chain Security 14 What is Cyber Threat Intelligence What is Shift Left What is Reverse Shell What is NIST? What is Transitive Dependency What is SSDLC
Vulnerability Management 17 What is Autofix What is Spoofing? What is RCE Vulnerability (Remote Code Execution Vulnerability)? What is ITDR What is CVSS Introduction to FedRAMP