Take2. IT Cyber Security Training
Cybersecurity or IT Security - answer The protection of info systems from theft or
damage to the hardware, the software, and to the information on them, as well as from
disruption or misdirection of the services they provide.
It includes:
- Controlling physical access to the hardware
- Protecting against harm that may come via network access, data, and code injection
Common Cyber Security Positions - answer1. Security Engineer
2. Network Security or Firewall Engineer
3. SOC Engineer (Security Op Center)
4. Continuous Monitoring Specialist
5. Information Assurance Engineer (IA Engineer)
6. Certification and Accreditation Specialist (CA)
7. Information Systems Security Officer (ISSO)
8. Chief Information Security Officer (CISO)
9. Penetration Tester
10. Malware/Forensics Engineer
ATO - answerAuthority to Operate
SPLUNK - answerA monitoring system that detects malicious infiltration
CISSP - answerCertified Information Systems Security Professional
*The highest level of certifications you can get.
*Must be in Cyber Security role for at least five years in order to be eligible
Vulnerability Scanning - answerSecurity technique used to identify security weaknesses
in a computer system.
Can be used by individuals or network admins for security purposes, or it can be used
by hackers attempting to gain unauthorized access to computer systems
Malware - answerSoftware (or code) used to disrupt computer operations, gather
sensitive information, gain access to private computer systems, or display unwanted
advertising
SIEM - answerSecurity Information and Event Management
Cybersecurity or IT Security - answer The protection of info systems from theft or
damage to the hardware, the software, and to the information on them, as well as from
disruption or misdirection of the services they provide.
It includes:
- Controlling physical access to the hardware
- Protecting against harm that may come via network access, data, and code injection
Common Cyber Security Positions - answer1. Security Engineer
2. Network Security or Firewall Engineer
3. SOC Engineer (Security Op Center)
4. Continuous Monitoring Specialist
5. Information Assurance Engineer (IA Engineer)
6. Certification and Accreditation Specialist (CA)
7. Information Systems Security Officer (ISSO)
8. Chief Information Security Officer (CISO)
9. Penetration Tester
10. Malware/Forensics Engineer
ATO - answerAuthority to Operate
SPLUNK - answerA monitoring system that detects malicious infiltration
CISSP - answerCertified Information Systems Security Professional
*The highest level of certifications you can get.
*Must be in Cyber Security role for at least five years in order to be eligible
Vulnerability Scanning - answerSecurity technique used to identify security weaknesses
in a computer system.
Can be used by individuals or network admins for security purposes, or it can be used
by hackers attempting to gain unauthorized access to computer systems
Malware - answerSoftware (or code) used to disrupt computer operations, gather
sensitive information, gain access to private computer systems, or display unwanted
advertising
SIEM - answerSecurity Information and Event Management