AES Security

AES Security

Main

  • Docs
  • Blog
  • About

Socials

  • GitHub
  • LinkedIn
    • 1.1: OSI & TCP/IP Models
    • 1.2: Common Protocols & Ports
    • 1.3: Firewalls & NAT
    • 1.4: VPNs & Tunneling
    • 1.5: IP Addressing & Subnetting
    • 2.1: Windows vs Linux vs Mac Security Models
    • 2.2: User Accounts, Groups, and Permissions
    • 2.3: Patch Management
    • 2.4: File System Security (NTFS, ext4, etc.)
    • 2.5: Logging and Auditing
    • 3.1: Malware Types
    • 3.2: Phishing & Social Engineering
    • 3.3: Denial of Service (DoS/DDoS)
    • 3.4: Insider Threats
    • 3.5: Supply Chain Attacks
    • 4.1: Symmetric vs Asymmetric Encryption
    • 4.2: Hashing (SHA, MD5, bcrypt)
    • 4.3: Digital Signatures & Certificates
    • 4.4: TLS/SSL & HTTPS
    • 4.5: Public Key Infrastructure (PKI)
    • 5.1: Intrusion Detection & Prevention Systems (IDS/IPS)
    • 5.2: Wireshark for Packet Analysis
    • 5.3: Firewalls (Host-Based & Network-Based)
    • 5.4: SIEM (Security Information and Event Management)
    • 5.5: Honeypots
    • 6.1: Vulnerability Scanning (Nessus, OpenVAS, etc.)
    • 6.2: Common Vulnerabilities & Exposures (CVE)
    • 6.3: OWASP Top 10
    • 6.4: Patch vs Configuration Management
    • 6.5: Penetration Testing Basics
    • 7.1: Authentication (AuthN) vs. Authorization (AuthZ)
    • 7.2: Single Sign-On (SSO)
    • 7.3: MFA / 2FA
    • 7.4: Role-Based Access Control (RBAC)
    • 7.5: Privileged Access Management (PAM)
    • 8.1: Incident Response Lifecycle
    • 8.2: Log Analysis: The Core of IR and Forensics
    • 8.3: Evidence Collection & Chain of Custody
    • 8.4: Memory (RAM) Forensics
    • 8.5: Threat Intelligence
    • 9.1: Security Frameworks
    • 9.2: Risk Assessment & Management
    • 9.3: Data Privacy Laws
    • 9.4: Security Policies & Procedures
    • 9.5: Business Continuity & Disaster Recovery (BC/DR)

Identity & Access Management (IAM)

7.1: Authentication (AuthN) vs. Authorization (AuthZ) →
7.2: Single Sign-on (SSO) →
7.3: MFA / 2FA →
7.4: Role-Based Access Control (RBAC) →
7.5: Privileged Access Management (PAM) →
  • © 2026 AES|SECURITY
  • Email