Certificates
- What is Certificate Enrollment and how is it used?
- How to avoid Certificate Outages
- Certificate Revocation
- Certificate Discovery
- How To Handle Breached Certificate and Key?
- What is Code Signing? How does Code Signing work?
- What is the certificate chain of trust?
- What is the Certificate Signing Request (CSR)?
- What is Certificate Scanning?
- What are the stages in a certificate’s lifecycle? How do you protect the certificate lifecycle?
- What is Certificate Management? SSL, TLS Certificate Management?
- What are the two types of CA?
- What is a Certificate Authority?
- What kind of attacks does SSL prevent?
- How To Renew Expired SSL Certificates?
- Best Practices to Protect SSL/TLS Certificates
- What is an SSL certificate and Why is it important?
- What is a Wildcard Domain Certificate?
- What is a Self-Signed Certificate? Advantages, Disadvantages & Risks
- What is an Extended Validation (EV) Certificate?
- Why are Digital Certificates Important?
- What are Digital Certificates?
Encryption Basics
- What is SIEM and How it works?
- How is Encryption and Decryption done in an SQL Server?
- What is Key Management? How does Key Management work?
- What are Secrets?
- What is an API?
- What is an HSM? What are the benefits of using an HSM?
- What is TLS/SSL?
- Define HTTPS. How is it different from HTTP?
- What is SSH Key Management? What are SSH Key Management best practices?
- What is Secure Shell (SSH)? How does Secure Shell work?
- What is Data Masking and Why is it important?
- Types of Tokenization: Vault and Vaultless
- What is Tokenization? How does it work?
- What is SHA? What is SHA used for?
- What is an Encryption Algorithm?
- What are Plaintext and Ciphertext? How do they interact?
- What is Cryptography in security? What are the different types of Cryptography?
- What is Decryption?
- What is Encryption?
Cloud Key Management Service Options
- Cloud Key Management Services: Advantages and Disadvantages
- What features do commercial key management solutions have?
- What is Secret Management?
- What is Software Key Management?
- What is Hybrid Key Management System (KMS)?
- What is Multi-Cloud Key Management?
- What is Silo Key Management?
- What is a Master Key?
- What are the services provided by Microsoft Azure?
- What services does Amazon Web Services (AWS) Provide?
- What are Google Cloud Platform (GCP) services?
- What does CSP stand for? What is the use of Cloud Service Provider?
Public Key Infrastructure (PKI)
- PKI management and its mistakes
- What is the Average Total Cost of a Data Breach?
- What is Machine Identity Management?
- Network Device Enrollment Service (NDES)
- What is an Object Identifier (OID) in PKI? How do you obtain an OID?
- What is ACME protocol? How does ACME protocol work?
- What are the elements for making a PKI?
- Where is PKI used?
- IoT Device Security Issues + What is IoT PKI?
- What is PKI? How does it protect your online infrastructure?
- What is Public Key Cryptography?
Common Encryption Algorithms
- How encryption can be used to protect data throughout its lifecycle (data-at-rest, data-in-transit, data-in-use)
- What is RC4? Is RC4 secure?
- What is ECDSA Encryption? How does it work?
- What is Twofish? Is Twofish secure?
- What is Blowfish in security? Who uses Blowfish?
- What is Format Preserving Encryption (FPE)? Is Format Preserving Encryption secure?
- What is RSA? How does an RSA work?
- What is AES? How does it work?
Comparisons
- What is the difference between Symmetric and Asymmetric Encryption? Which is better for data security?
- What is the difference between Encryption and Masking? Which is better for data security?
- What is the difference between Encryption and Signing? Why should you use digital signatures?
- What is the difference between Encryption and Tokenization? Which is better for data security?
- What is the difference between Encryption and Compression? What order should they be done in?
- What is difference between Encryption and Hashing? Is Hashing more secure than Encryption?
Regulations, Standards & Compliance
- What is X.509 standard and certificate?
- What is the NIST? What is the purpose of the NIST?
- What is HIPAA? How do you become compliant with HIPAA?
- What is GDPR? How do you become compliant with GDPR?
- What is PCI DSS? How do you become compliant with PCI DSS?
- What is FIPS? How do you become compliant with FIPS?
DevOps
Bring your own Key Terminology
Cybersecurity Frameworks
Key Management Interoperability Protocol
Let's talk