Become more familiar with security validation terms and concepts.
Active Testing
Advanced Persistent Threat
Attack Path
Attack Vector
Automated Penetration Testing
Automated Security
Automated Security Validation
AWS RDS Database
AWS S3 Bucket Security
Blue Team
Breach and Attack Simulation (BAS)
Cloud Asset Discovery
Cloud Security
Cloud Security Posture Management
Cloud Vulnerability Identification
Computer Network Attack
Continuous Automated Red Teaming
Continuous Threat Exposure Management (CTEM)
Continuous Validation
Cyber Kill Chain
Cyber Reconnaissance
Cyber Risk Management
Data Breach
Digital Footprint
Enumeration
Ethical Hacking
Exposure Management
External Attack Surface Management (EASM)
Hybrid Cloud Security
Lambda Function
Lateral Movement
Minimum Effective Toolset
Misconfigured S3 Bucket
Network Penetration Testing
Network Reconnaissance
Open Source Intelligence
Proactive Security
Ransomware Readiness Assessment
Red Teaming
Risk Assessment
Risk Prioritization
Security Control Validation
Security Validation
Sensitive Data Protection
Shift Left
Threat Intelligence
Vulnerability Assessment
Vulnerability Management
Zero Trust