Domain 6 links:
- Auditing and Logging https://en.wikipedia.org/wiki/Audit_trail
- Information security audit https://en.wikipedia.org/wiki/Information_technology_security_audit
- IT Audits https://www.theiia.org/en/standards/2024-standards/global-internal-audit-standards/
- NIST SP 800-115 https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
- Security Audits https://en.wikipedia.org/wiki/Information_technology_audit
- NIST SP 800-37 https://en.wikipedia.org/wiki/NIST_Special_Publication_800-37
- Vulnerability (computing) https://en.wikipedia.org/wiki/Vulnerability_(computing)
- Vulnerability Assessment https://en.wikipedia.org/wiki/Vulnerability_assessment
- Security Assessments https://en.wikipedia.org/wiki/IT_security_assessment
- Vulnerability Assessments vs. Penetration Tests https://www.experts-exchange.com/articles/31793/Vulnerability-Assessments-versus-Penetration-Tests.html
- Security Controls Testing https://en.wikipedia.org/wiki/Security_testing
- Vulnerability Mitigation https://en.wikipedia.org/wiki/Vulnerability_management
- Core Security Penetration Testing Services http:https:https://www.coresecurity.com/
- Code Review and Testing https://en.wikipedia.org/wiki/Code_review
- Continuous Monitoring https://en.wikipedia.org/wiki/Continuous_monitoring
- Kali Linux https://www.kali.org/
- Coverage Analysis https://en.wikipedia.org/wiki/Code_coverage
- Dynamic Testing https://en.wikipedia.org/wiki/Dynamic_testing
- Social Engineering https://en.wikipedia.org/wiki/Social_engineering_(security)
- 0-day Attacks https://en.wikipedia.org/wiki/Zero-day_(computing)
- Pen Testing Tools https://en.wikipedia.org/wiki/Penetration_test#Tools
- Penetration Testing https://en.wikipedia.org/wiki/Penetration_test
- Security Fuzzers https://en.wikipedia.org/wiki/Fuzzing Vulnerability Scanners https://en.wikipedia.org/wiki/Vulnerability_scanner
- Metasploit https://metasploit.com/
- Nessus Software https://en.wikipedia.org/wiki/Nessus_(software)
- Password Cracking https://en.wikipedia.org/wiki/Password_cracking
- Rainbow Table https://en.wikipedia.org/wiki/Rainbow_table
- Exception Handling https://en.wikipedia.org/wiki/Exception_handling
- Misuse Case Testing https://en.wikipedia.org/wiki/Misuse_case
- SOC 1/2/3 reports https://en.wikipedia.org/wiki/System_and_Organization_Controls
- SOC 2 Report https://www.aicpa-cima.com/topic/audit-assurance/audit-and-assurance-greater-than-soc-2
