Areas of Compentencies
Cryptopgraphy & Security Architecture
Key Negotiation Protocols and Key Management
Public Key Infrastructure (PKI)
Conceptual Security Architecture
Logical Security Architecture
Physical Security Architecture
Component Security Architecture
Contextual Security Architecture
Cyber Security Operational Policy & Risk Management
Operational Policy
Laws, Regulations, and Standards
Data Classification and Security Policy Models
Enforcement and Compliance
Categorization of Security Controls
Selection of Security Controls
Implementation of Security Controls
Assessment of Security Controls
Authorization of Security Controls
Continous Monitoring of Security Controls
Cyber Security Operations Management & Secure Software Design
Cyber Security vs. Business Practices
Return on Investment (ROI)
Secure Software Design and Development Lifecycles
Vulnerability Expolitations
Trusted Computing Platform (TCP)
Trusted Platform Module (TPM)
Network Vulnerability & Cyber Threat Intelligence
Threat Intelligence Lifecycle
4 Pās (People, Process, Policy, and Partners)
Security Orchestration
CIA Triad
Vulnerability Intelligence