SKILL BENCHMARK

Security Threat Intelligence Competency (Intermediate Level)

  • 19m
  • 19 questions
Security Threat Intelligence Competency benchmark measures whether a learner has a working understanding of the security threat intelligence principles and practices with some exposure to, and limited experience with, security threat intelligence tools and development. A learner who scores high on this benchmark demonstrates professional competency in all of the areas of the security threat intelligence discipline.

Topics covered

  • create, modify, and delete user accounts in a Linux system
  • define an Advanced Persistent Threat and its purpose
  • define the function of security architecture and name related frameworks
  • describe common security vulnerabilities in code that can lead to exploits
  • describe the elements that make up a scripting language in contrast to a full-fledged computer program
  • describe the motives behind an APT and the probable targets
  • describe the standard information security roles within an organization
  • differentiate using examples what exposure, threat or risk, security attack, exploits or breach of security, and impact/severity mean
  • identify APT defense best practices
  • identify the methods that can be used to make the APT defenses stronger
  • identify the structure of common executable formats based on their binary signatures
  • illustrate using examples common actions from daily work-life that expose people to security risks
  • list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
  • list the steps of the APT lifecycle
  • outline the core foundational concepts of information security and recognize why it is important to an organization
  • recall what is meant by information security, what it protects, and how it protects it
  • recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
  • recognize the standard security threats to an organization
  • verify the integrity of a downloaded files based on its hash value

RECENTLY ADDED COURSES