Sharjah

← Study Log

Cybersecurity

working-in


Application security, authentication, authorization, threat modeling. Working-in depth from Slipwise's regulatory requirements and prior project work. The honest gaps: red-team / offensive practice, which I have not done at any scale; and formal cryptography, which I treat with deliberate humility.