# Cybersecurity Domains

### Governance, Risk & Compliance

* ISO 27001 / HIPPA / PCI SOC
* Firewall Compliance
* Physical & Logical Reviews
* Configuration Compliance
* Audit & Compliance Analysis

### Mobile Security

* Authentication & Onboarding
* Rogue Access Point Detection
* Wireless Security Protocols
* OWASP Mobile Top 10
* Automated Mobile App Scanning
* Dynamic Mobile App Analysis
* Secure Coding Practices
* Mobile Pen Testing
* Secure Code Review

### Application Security

* Secure Code Review
* Application Pen Testing
* Vulnerability Validation
* Secure Coding Practices
* Web App Firewall
* Web App Security
* OWASP Top 10 / SANS CWE Top 25
* Database Activity Monitoring
* Content Security
* Secure File Transfer

### Network Security

* Firewall Management
* Network Access Control
* Secure Network Design
* Unified Threat Management
* Remote Access
* IDS/IPS
* Pen Testing

### Data Security

* Data Encryption
* Data Leakage Prevention

### Infrastructure Security

* DNS Security
* Mail Security
* Unified Communications
* SIEM (Security Info & Event Mgmt)
* Log / False Positive Analysis
* Zero-Day Vulnerability Tracking

### Advance Threat Protection

* Botnet Protection
* Malware Analysis & Anti-Malware
* Sandboxing / Emulation
* Application Whitelisting
* Network Forensics
* Automated Security Analytics

### System Security

* Windows/Linux Server Security
* Vulnerability & Patch Management
* Automated Vulnerability Scanning
