Understanding basic safety rules
- Confidentiality; integrity; availability; threat and risk impact; principle of least privilege; social engineering; attack surface analysis; threat modeling
Understand a company or organization's cyber security structures, processes and audits
- Areas of specialization in cyber security; roles on the security team; cyber security audits; resources and internal and external audits
Understanding physical security
- Facility security; computer security; removable devices; access control; mobile device security; keyloggers
Understanding Internet security
- Browser security settings; secure websites
Understanding wireless security
- Advantages and disadvantages of specific types of security; Keys; SSIDs; MAC filters.
Understanding computer security
- Understanding user authentication
- Multi-component authentication; physical and virtual smart cards; Remote User Authentication Service (RADIUS); biometrics; use of "Run As" option, to perform administrative tasks
Understanding the powers
- File system permissions; sharing permissions; enabling and disabling inheritance; behavior when moving or copying files on the same drive or to another drive; multiple groups with different permissions; basic and advanced permissions; taking ownership; delegation; inheritance; the importance of Registry and Active Directory;
Understanding password policies
- Password complexity; account lockout; password length; password history; time between password changes; enforcement via group policy; common attack methods; password reset procedures; password protection for domain user accounts
Understanding the principles of protocol
- Types of protocols; what can be logged; enabling logging; what to log for specific purposes; where to log information; how to secure information
Understanding encryption
- File Encryption System (EFS); impact of EFS-encrypted folders on file transfer / copying; BitLocker (To Go); TPM; software-based encryption; email encryption and signing; virtual private network (VPN); public key / private key; encryption algorithms; certificate properties; certification services; PKI infrastructure / certification services; hardware tokens, restrict devices to run only trusted applications
Understanding malware
- Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; back doors; zero day attacks
Understanding dedicated firewalls
- Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software-based firewall; state and stateless inspection
Understanding network isolation
- Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understanding protocol security
- Protocol spoofing; IPsec; tunneling; DNSsec; network eavesdropping; DoS attacks; common attack methods
Understanding the protection of client stations
- Antivirus; protection against unwanted software installations; User Account Control (UAC); client operating system and client software updates; offline folder encryption; software restriction rules; principle of least privilege
Understanding email security
- Anti-spam, anti-virus software, spoofing, phishing and pharming; Client protection vs. server protection; Sender Policy Framework (SPF) records; PTR records
Understanding server protection
- Unbundling of services; hardening; server updates; secure dynamic domain name system (DNS) updates; deactivation of unsecured authentication protocols; read-only domain controllers (RODCs)