WELCOME TO CYBER HYGIENE 4
- Identify and classify information and assets
- Understanding cryptanalytic attack methods
- Session management
- Identity registration, verification and establishment
- Federated Identity Management (FIM)
- Credential management systems
- Just-in-time (JIT)
- Federated identity with a third-party service
- Implement and manage authorization mechanisms
- Set up authentication systems
- Design and validate evaluation, testing and verification strategies
- Perform security testing
- Understand and participate in change management processes
- Understand and integrate security into the software development life cycle (SDLC)
- Evaluate software security effectiveness
- Define and apply secure coding guidelines and standards