SKILL BENCHMARK
Security Threat Intelligence Proficiency (Advanced Level)
- 30m
- 31 questions
The Security Threat Intelligence Proficiency benchmark measures whether a learner has an advanced understanding of the security threat intelligence principles and practices with additional experience with security threat intelligence tools and development. A learner who scores high on this benchmark demonstrates professional proficiency in all of the major areas of the security threat intelligence discipline, across a variety of different platforms and deployments. This learner works and act almost 100% independently of others, and is seen as a leader in the industry.
Topics covered
- create, modify, and delete user accounts in a Linux system
- define an Advanced Persistent Threat and its purpose
- define risks and recall methods used to response, reduce, avoid, accept, and transfer risks
- define the PASTA threat modeling method and its stages
- define the risk assessment processes that can help you protect your assets
- define the STRIDE model in the context of threat identification
- describe common security vulnerabilities in code that can lead to exploits
- describe the availability concepts of the CIA Triad
- describe the CIA triad and its importance and outline some cybersecurity confidentiality concepts
- describe the elements that make up a scripting language in contrast to a full-fledged computer program
- describe the Equation AKA APT group and its involvement in various cyber crimes
- describe the integrity concepts of the CIA Triad
- describe the motives behind an APT and the probable targets
- describe the purpose and importance of cybersecurity and outline the cybersecurity framework
- describe the standard information security roles within an organization
- discuss the CIA impacts and methods
- identify APT defense best practices
- identify the key points for creating an effective checklist to address APT attacks
- identify the methods that can be used to make the APT defenses stronger
- identify the structure of common executable formats based on their binary signatures
- list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
- list the domains into which various types of information security can be categorized
- list the responsibilities of various information security roles within an organization
- list the steps of the APT lifecycle
- list the tools that are used when conducting an APT
- outline the core foundational concepts of information security and recognize why it is important to an organization
- recall the method(s) to deal with Advanced Persistent Threats
- recognize the importance of effective communication for fostering proper information security
- recognize the importance of strategic planning and decision-making when it comes to information security
- recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
- verify the integrity of a downloaded files based on its hash value