Table of Contents

1.0 Security Concepts

1.1 Common Security Principles

Section 1 Notes
1.1a Describe confidentiality, integrity, availability (CIA)
1.1b Describe SIEM technology
1.1c Identify common security terms
1.1d Identify common network security zones

1.2 Common Security Threats

1.2a Identify common network attacks
1.2b Describe social engineering
1.2c Identify malware
1.2d Classify the vectors of data loss/exfiltration

1.3 Cryptography concepts

1.3a Describe key exchange
1.3b Describe hash algorithm
1.3c Compare and contrast symmetric and asymmetric encryption
1.3d Describe digital signatures, certificates, and PKI