A
D
E
- Endpoint Security
- Endpoint Management
- Encryption (At rest vs In transit)
- EDR vs XDR
- Endpoint DLP
- Email DLP
F
- Firewall (Traditional vs Cloud Firewall)
- Phishing vs Spear Phishing
- Fileless Malware
- Fleet Management
- Fingerprinting in DLP
- False Positives Remediation
G
- Governance, Risk & Compliance (GRC)
- GenAI Security Risks
- GDPR (for global relevance)
H
- Hashing vs Encryption
- Honeypot
- Hybrid Work Security
I
- Identity and Access Management (IAM)
- Incident Report
- Insider Threat
- IP Spoofing
- IT & Security Management
J
- Jailbreaking (AI / LLM context)
- JSON Web Token (JWT)
K
- Keylogger
- Kill Chain (Cyber Kill Chain)
L
- Least Privilege Principle
- Lateral Movement
- Log Management
M
- Malware
- Man-in-the-Middle (MITM) Attack
- Mobile Device Management (MDM)
N
- Network Security
- Network Segmentation
- Zero Trust Network Access (ZTNA)
- Network Data Loss Prevention
O
- OAuth
- Open Redirect
- OSINT (Open Source Intelligence)
- OCR
P
- Phishing
- Patch Management
- Privileged Access Management (PAM)
Q
- Query Injection (SQL Injection basics)
- Quantum Cryptography (future-facing content)
R
- Ransomware
- Risk Assessment
- Remote Access Security
- RMM
- Remote Lock & Wipe
S
- Security Service Edge (SSE)
- Secure Web Gateway (SWG)
- SOC (Security Operations Center)
- SSPM
- Shadow IT
- Single Sign-On (SSO)
- Software Distribution
- SaaS DLP
T
- Threat Intelligence
- Tokenization
- Two-Factor Authentication (2FA)
- TLS/SSL
U
- Unified Endpoint Management (UEM)
- User Behavior Analytics (UBA)
- URL Filtering
V
- VPN vs ZTNA
- Vulnerability Management
- Virus vs Worm vs Trojan
W
- Web Security
- Web Filtering
- Whitelisting vs Blacklisting
X
- XDR (Extended Detection and Response)
Y
- YARA Rules
- Zero-Day vs Known Vulnerabilities
Z
- Zero Trust Security
- Zero-Day Attack
- ZTNA (Zero Trust Network Access)