Become more familiar with security validation terms and concepts.
Active Testing
Advanced Persistent Threat
Adversarial Exposure Validation (AEV)
Attack Path
Attack Vector
Automated Penetration Testing
Automated Security
Automated Security Validation
AWS RDS Database
AWS S3 Bucket Security
Blue Team
Breach and Attack Simulation (BAS)
Cloud Asset Discovery
Cloud Security
Cloud Security Posture Management
Cloud Vulnerability Identification
Command and Control (C2) Attacks
Computer Network Attack
Continuous Automated Red Teaming
Continuous Threat Exposure Management (CTEM)
Continuous Validation
Cyber Asset Attack Surface Management (CAASM)
Cyber Kill Chain
Cyber Reconnaissance
Cyber Risk Management
Data Breach
Digital Footprint
Enumeration
Ethical Hacking
Exposure Assessment Platforms (EAPs)
Exposure Management
External Attack Surface Management (EASM)
Hybrid Cloud Security Solutions
Indicators of Compromise (IOC)
Lambda Functions
Lateral Movement
Minimum Effective Toolset
Misconfigured S3 Bucket
Network Penetration Testing
Network Reconnaissance
Open Source Intelligence (OSINT)
Penetration Testing as a Service (PTaaS)
Proactive Security
Ransomware as a Service (RaaS)
Ransomware Readiness Assessment
Red Teaming
Risk Assessment
Risk Prioritization
Security Control Validation
Security Validation
Sensitive Data Protection in the Cloud
Shift Left
Threat Intelligence
Vulnerability Assessment
Vulnerability Management
Zero Trust