SKILL BENCHMARK
Security Threat Intelligence Competency (Intermediate Level)
- 19m
- 19 questions
Security Threat Intelligence Competency benchmark measures whether a learner has a working understanding of the security threat intelligence principles and practices with some exposure to, and limited experience with, security threat intelligence tools and development. A learner who scores high on this benchmark demonstrates professional competency in all of the areas of the security threat intelligence discipline.
Topics covered
- create, modify, and delete user accounts in a Linux system
- define an Advanced Persistent Threat and its purpose
- define the function of security architecture and name related frameworks
- describe common security vulnerabilities in code that can lead to exploits
- describe the elements that make up a scripting language in contrast to a full-fledged computer program
- describe the motives behind an APT and the probable targets
- describe the standard information security roles within an organization
- differentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity mean
- identify APT defense best practices
- identify the methods that can be used to make the APT defenses stronger
- identify the structure of common executable formats based on their binary signatures
- illustrate using examples common actions from daily work-life that expose people to security risks
- list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
- list the steps of the APT lifecycle
- outline the core foundational concepts of information security and recognize why it is important to an organization
- recall what is meant by information security, what it protects, and how it protects it
- recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
- recognize the standard security threats to an organization
- verify the integrity of a downloaded files based on its hash value