1. Integration Authentication Protocol
2. SAML
3. OAuth 2.0
4. Kerberos
5. Two-Way SSL
6. IP Filtering
7. Privileged Access Management
8. Encryption and Decryption
9. Key length of SSL protocol
10.IDP
11. Certificate Signing request
12. Mod Security
13. IT Security Risk Assessment
a. Introduction
b. Week authentication protocol
c. Weak Cipher