Describe the shared responsibility and the defense in depth security models.
Describe the Zero Trust model.
Describe the concepts of encryption and hashing.
Describe some basic compliance concepts.
Understand the difference between authentication and authorization.
Describe the concept of identity as a security perimeter.
Describe identity-related services