SKILL BENCHMARK

Security Threat Intelligence Proficiency

  • 30m
  • 31 questions
The Security Threat Intelligence Proficiency benchmark measures whether a learner has an advanced understanding of the security threat intelligence principles and practices with additional experience with security threat intelligence tools and development. A learner who scores high on this benchmark demonstrates professional proficiency in all of the major areas of the security threat intelligence discipline, across a variety of different platforms and deployments. This learner works and act almost 100% independently of others, and is seen as a leader in the industry.

Topics covered

  • create, modify, and delete user accounts in a Linux system
  • define an Advanced Persistent Threat and its purpose
  • define risks and recall methods used to response, reduce, avoid, accept, and transfer risks
  • define the PASTA threat modeling method and its stages
  • define the risk assessment processes that can help you protect your assets
  • define the STRIDE model in the context of threat identification
  • describe common security vulnerabilities in code that can lead to exploits
  • describe the availability concepts of the CIA Triad
  • describe the CIA triad and its importance and outline some cybersecurity confidentiality concepts
  • describe the elements that make up a scripting language in contrast to a full-fledged computer program
  • describe the Equation AKA APT group and its involvement in various cyber crimes
  • describe the integrity concepts of the CIA Triad
  • describe the motives behind an APT and the probable targets
  • describe the purpose and importance of cybersecurity and outline the cybersecurity framework
  • describe the standard information security roles within an organization
  • discuss the CIA impacts and methods
  • identify APT defense best practices
  • identify the key points for creating an effective checklist to address APT attacks
  • identify the methods that can be used to make the APT defenses stronger
  • identify the structure of common executable formats based on their binary signatures
  • list and describe the critical information security issues -confidentiality, integrity, availability, authentication, non-repudiation, privacy, and trust
  • list the domains into which various types of information security can be categorized
  • list the responsibilities of various information security roles within an organization
  • list the steps of the APT lifecycle
  • list the tools that are used when conducting an APT
  • outline the core foundational concepts of information security and recognize why it is important to an organization
  • recall the method(s) to deal with Advanced Persistent Threats
  • recognize the importance of effective communication for fostering proper information security
  • recognize the importance of strategic planning and decision-making when it comes to information security
  • recognize the importance of threat identification and describe the concepts of threat modeling and threat identification sources and methods
  • verify the integrity of a downloaded files based on its hash value

recently added courses