John Johnson
ITS 122 - 10.5 - Storage, Network, and Compute Security Controls
ITS 122 - 10.4 - Software-Defined Networking
ITS 122 - 10.3 - Virtualization
ITS 122 - Containers, Serverless, and Microservices Architectures
ITS 122 - 10.1 - Cloud Computing and Deployment Models
ITS 122 - 9.5 - Boot Integrity
ITS 122 - 9.4-Endpoint Hardening: Software Updates,Patch Management,Operating System Vulnerabilities
ITS 122 - 9.3 Endpoint Hardening: Disk, Registry, Ports, and Services
ITS 122 - 9.2 - Endpoint Protection: DLP and Host-Based Systems
ITS 122 - 9.1 - Endpoint Protection: EDR and Anti-Malware
ITS 122 - 8.7 - OWASP and Input Validation
ITS 122 - 8.6 0 Code Review, Fuzzing, and Automation
ITS 122 - 8.5 - Email Security
ITS 122 - 8.4 - Database Security
ITS 122 - 8.3 - Elasticity, Scalability, and Software Diversity.
ITS 122 - 8.2 - Secure Coding Practices
ITS 122 - 8.1 - Application Environments, Provisioning, and Version Control
ITS 122 - 7.8 - Directory Traversal, API Attacks, and SSL Stripping
ITS 122 - 7.7 - Driver Manipulation, Privilege Escalation, and Password Attacks
ITS 122 - 7.6 - Race Conditions and Resource Exhaustion
ITS 122 - 7.5 - Injection Attacks: SQL, XML, LDAP, and DLL
ITS 122 - 7.4 - Replay and Pass the Hash Attacks
ITS 122 - 7.3 - Memory Vulnerabilities: Buffer/Integer Overflows, Memory Leak, Pointer Dereferencing
ITS 122 - 7.2 Cross-site and Server-Side Request Forgeries (CSRF and SSRF)
ITS 122 - 7.1 - Cross Site Scripting
ITS 122 - 6.9 - Mobile Devices
ITS 122 - 6.8 - Embedded Systems
ITS 122 - 6.7 - Bluetooth Security
ITS 122 - 4.6 - WLAN Authentication and Attacks
ITS 122 - 6.5 WLAN Security Standards