Application Security
Mobile Application Security, Patch Management, Secure Coding, Web Application Security

Big Data
Database Security, Information Management

Cloud Security
Virtualization Security

Audit, Governance Risk, Legislation and Standards, PCI-DSS, Regulation, Security Policy

Advanced Persistent Threats, Cyber-criminals and Convictions, Phishing, Threat Intelligence, Unified Threat Management

Dark Web
Is part of the internet that isn’t visible to search engines and requires the use of an anonymity tool.

Data Protection
Data Breaches, Data Loss Prevention, Information Risk Management, Secure Disposal

Digital Forensics
Data Breach Incident Management, Fraud Detection, IT Forensics, Security Information and Event Management (SIEM)

Digital Signatures and Certificates, PKI, SSH, SSL

Identity Access Management
Authentication Tokens, Biometrics, Digital Rights Management, Single Sign On, Two-Factor Authentication, Virtual Authentication

Internet Security
DDoS, Email Security, IM Security, Social Media Security

Anti‐Spam, Anti‐Virus, Ransomware

Mobile Security
BYOD, Mobile Access Management, Mobile Device Management, Tablet Security, VOIP Security

Network Security
Access Rights Management, End Point Security, Firewalls, Intrusion Prevention/Detection, Network Access Control, Security Monitoring, Wireless Security

Government Security, Suveillance

Risk Management
Risk and Vulnerability Assessment, Security Analytics, Vulnerability Management

Internet of Things
Network of devices such as vehicles, and home appliances that contain electronics, software, sensors, actuators, and connectivity which allows these things to connect, interact and exchange data.

Software security flaw, Zero-Day, Exploits