Standards in this Framework
| Standard | Description |
|---|---|
| 1.1 | Explain common security principles |
| 1.2 | Explain cybersecurity frameworks and industry-accepted best practices |
| 1.3 | Explain vulnerabilities, threats, and common attacks |
| 1.4 | Recognize social engineering attacks |
| 1.5 | Explain access management principles and procedures |
| 1.6 | Explain how encryption protects the confidentiality and integrity of data |
| 2.1 | Identify vulnerabilities associated with commonly used protocols |
| 2.2 | Describe the role of addressing in network security |
| 2.3 | Describe the purpose and function of network security technologies |
| 2.4 | Validate the security of wireless networks |
| 2.5 | Examine network security logs to identify anomalies |
| 3.1 | Apply security settings to harden operating systems |
| 3.2 | Use endpoint tools to gather security assessment information |
| 3.3 | Use packet capture utilities to identify anomalies |
| 3.4 | Demonstrate familiarity with endpoint security policies and standards |
| 3.5 | Interpret system logs to identify anomalies |
| 3.6 | Perform malware removal |
| 4.1 | Use threat intelligence sources to identify potential network vulnerabilities |
| 4.2 | Explain risk management |
| 4.3 | Explain the penetration testing process |
| 5.1 | Monitor security events to determine if escalation is required |
| 5.2 | Explain the digital forensics process and attack frameworks |
| 5.3 | Explain the elements of cybersecurity incident response |
| 5.4 | Explain the importance of disaster recovery and business continuity planning |
| 5.5 | Assist users in restoring data after an incident |