Table of Contents

1.0 Security Concepts

1.1 Common Security Principles

Section 1.1 CSP Notes

1.1a Describe confidentiality, integrity, availability (CIA)

1.1b Describe SIEM technology

1.1c Identify common security terms

1.1d Identify common network security zones

1.2 Common Security Threats

1.2a Identify common network attacks

1.2b Describe social engineering

1.2c Identify malware

1.2d Classify the vectors of data loss/exfiltration

1.3 Cryptography concepts

1.3.a Describe key exchange

Main Benefits of VPNs

Confidentiality
Data Integrity
Authentication
Antireplay Protection

Cryptography Basic Components

Ciphers and Keys

Ciphers
Keys

Block and Stream Ciphers

Block Ciphers
Stream Ciphers

Symmetric and Asymmetric Algorithms

Symmetric
Asymmetric