Security Analyst to Security Architect Competency (Intermediate Level)

  • 23m
  • 23 questions
Security Analyst to Security Architect Competency benchmark will measure that a learner has working exposure and practice with security analyst principles. A learner who scores high on this benchmark demonstrates that they have competency in some areas of security analytics, can participate in IT security discussions, and can work independently under the guidance of more advanced security analyst practitioners.

Topics covered

  • describe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memory
  • describe a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court
  • describe challenges of working with cloud computing environments
  • describe microservices and APIs and highlight security concerns associated with each
  • describe penetration testing and its purpose
  • describe the importance of a security management process and its common functions
  • describe the major components of a security assessment and test strategies approaches
  • describe the procedure to properly establish and maintain chain of custody
  • describe the role of forensic laboratories and hardware and software tools
  • differentiate between criminal, civil, and intellectual property investigations
  • list common software vulnerabilities such as buffer overflow and injection flaws
  • provide an overview of digital forensics
  • recognize best practices and considerations when working with digital evidence
  • recognize how to avoid vulnerabilities by using secure coding techniques
  • recognize how viruses and other malware work
  • recognize legal considerations including search warrants and privacy considerations
  • recognize methods to detect potential software vulnerabilities
  • recognize security control review methods including log and code reviews
  • recognize security control testing mechanisms such as code testing
  • recognize steps and techniques to analyze risk
  • recognize steps to properly test software to ensure it is secure
  • recognize the different types of forensics including computer, mobile, network, vehicle, and IoT
  • recognize the importance of ethical decision making related to digital forensic work