Because they're everywhere and kind of overwhelming.

Acronym Meaning
ACL Access Control List
ADFS Active Directory Federation Services
AP Access Point
API Application Programming Interface
APNS Apple Push Notification Service
APT Advanced Persistent Threat
ASLR Address Space Layout Randomization
BPA Business Partnership Agreement
CA Certificate Authority
CAPEC Common Attack Patterns Enumeration Classification
CERT Computer Emergency Response Team
CGI Common Gateway Interface
CIFS Common Internet File System
CIRT Computer Incident Response Team
CORS Cross-Origin Request Scripting
COTS Commercial Off-The-Shelf
CRL Certificate Revocation List
CSRF Cross-Site Request Forgery
CVE Common Vulnerabilities Exposures
CVSS Common Vulnerability Scoring System
CWE Common Weakness Enumeration
DAST Dynamic Application Security Testing
DCOM Distributed Component Object Model
DFD Data Flow Diagram
DLL Dynamic Link Library
DNS Domain Name Service
DOM Document Object Model
DoS Denial of Service
DTP Dynamic Trunking Protocol
ECDSA Elliptic Curve Digital Signature Algorithm
EULA End User License Agreement
FTP File Transfer Protocol
GPO Group Policy Object
GPP Generic Packetized Protocol
GRE Generic Routing Encapsulation
HSTS HTTP Strict Transport Security
HTML HyperText Markup Language
I/O Input/Output
ICMP Internet Control Message Protocol
ICS Industrial Control Systems
IDOR Indirect Object Reference
IoT Internet of Things
IPS Intrusion Prevention System
IV Initialization Vector
JPCERT Japan Computer Emergency Response Team
JTAG Joint Test Action Group
LAPS Local Administrator Password Solution
LFI Local File Inclusion
LLMNR Link-Local Multicast Name Resolution
LPE Local Privilege Escalation
LSASS Local Security Authority Subsystem Service
MDM Mobile Device Management
MFA Multifactor Authentication
MITM Man-in-the-Middle
MSA Master Service Agreement
NAC Network Access Control
NBNS Net Bios Name Service
NDA Non-Disclosure Agreement
NFC Near-Field Communication
NIST National Institute of Standards and Technology
NOP No Operation
NSE Network Service Engine
OS Operating System
OSINT Open Source Intelligence
OWASP Open Web Application Security Project
PII Personally Identifiable Information
POS Point of Sale
PS PowerShell
RCE Remote Code Execution
RDP Remote Desktop Protocol
RFI Remote File Inclusion
RFID Radio Frequent ID
RFP Request for Proposal
ROE Rules of Engagement
ROP Return-oriented Programming
RPC Remote Procedure Call
RSH Remote Shell
RTOS Real Time Operating System
SAM Security Account Manager
SAN Subject Alternative Name
SAST Static Application Security Testing
SCADA Supervisory Control and Data Acquisition
SCEP Simple Certificate Enrollment Protocol
SCP Secure Copy
SDK Software Development Kit
SGID Set Group ID
SID Secure Identifier
SIEM Security Incident Event Manager
SLA Service Level Agreement
SMB Server Message Block
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOAP Simple Object Access Protocol
SOC Security Operation Center
SOW Statement of Work
SPN Service Principle Name
SQL Structured Query Language
SSH Secure Shell
SSL Secure Sockets Layer
STP Spanning Tree Protocol
SUID Set User ID
TCP Transmission Control Protocol
TLS Transport Layer Security
TOTP Time-Based One-Time Password
TPM Trusted Platform Module
TTP Tactics, Techniques and Procedures
UDP User Diagram Protocol
VLAN Virtual Local Area Network
VM Virtual Machine
VNC Virtual Network Connection
VPN Virtual Private Network
WADL Web Application Description Language
WAF Web Application Firewall
WAR Web Application Archive
WEP Wired Equivalency Protocol
WinRM Windows Remote Management
WMI Windows Management Instrumentation
WPAD Web Proxy Auto-Discovery
WPS WiFi Protected Setup
WSDL Web Services Description Language
XSD XML Schema Document
XSS Cross-Site Scripting
XST Cross-Site Tracing
XXE External Entity