Standards in this Framework
Standard | Description |
---|---|
1.1 | Explain common security principles |
1.2 | Explain cybersecurity frameworks and industry-accepted best practices |
1.3 | Explain vulnerabilities, threats, and common attacks |
1.4 | Recognize social engineering attacks |
1.5 | Explain access management principles and procedures |
1.6 | Explain how encryption protects the confidentiality and integrity of data |
2.1 | Identify vulnerabilities associated with commonly used protocols |
2.2 | Describe the role of addressing in network security |
2.3 | Describe the purpose and function of network security technologies |
2.4 | Validate the security of wireless networks |
2.5 | Examine network security logs to identify anomalies |
3.1 | Apply security settings to harden operating systems |
3.2 | Use endpoint tools to gather security assessment information |
3.3 | Use packet capture utilities to identify anomalies |
3.4 | Demonstrate familiarity with endpoint security policies and standards |
3.5 | Interpret system logs to identify anomalies |
3.6 | Perform malware removal |
4.1 | Use threat intelligence sources to identify potential network vulnerabilities |
4.2 | Explain risk management |
4.3 | Explain the penetration testing process |
5.1 | Monitor security events to determine if escalation is required |
5.2 | Explain the digital forensics process and attack frameworks |
5.3 | Explain the elements of cybersecurity incident response |
5.4 | Explain the importance of disaster recovery and business continuity planning |
5.5 | Assist users in restoring data after an incident |