- Tools for Testing & scanning
- Generational versus Mutation Fuzzing
- Interface Testing
- Network Flow Logging
- RFC 1918 - non-routable private IP Address Ranges
- IT Protocols for Auditing
- NIST 800-137 on Information Security Continuous Monitoring (ISCM); steps are: Define, Establish, Implement, Analyze & Report findings, Respond and Review & Update
- NIST 800-53A: a special publication on assessments of security controls and privacy controls
- SOC 1, SOC 2, SOC3 and Type I and Type II Audits
No comments:
Post a Comment