Authentication, authorization, cryptography, and secure architecture patterns.
Authorization framework — access tokens, scopes, and grant types
Structure, signing algorithms, validation, and security pitfalls
bcrypt, scrypt, Argon2 — why MD5 and SHA aren't enough
Never trust, always verify — modern security perimeters