Portfolio of kaleidoscopic fleeting interests
Brief overview of vulnerability management and scanning
Basics of identity, authentication, and authorization