System and network architecture
- System hardening
- Tools and defensive practices used to improve asset security.
- Cloud deployment models
- Public cloud: off-premises infrastructure owned by a provider.
- Hybrid cloud: mixed on-premises and cloud services.
- Private/on-premises cloud: dedicated internal infrastructure.
- Zero trust
- No implicit trust; every identity and action is continuously verified.
- Virtualization
- Splits hardware resources into multiple virtual machines (VMs).
- Containerization
- Bundles code, runtime, and dependencies for portable application deployment.
- PKI
- Public key infrastructure for certificate-based trust and encryption.
- SSO
- Single sign-on for centralized authentication.
- MFA
- Multi-factor authentication with at least two independent factors.
- Federation
- Cross-organization identity trust to allow external sign-in.
- DLP
- Data loss prevention controls for sensitive data.
- PII
- Personally identifiable information handling.
Tools and techniques
- Packet and network analysis tools
- Security operations platforms
- Malware and file reputation
- VirusTotal for file and URL triage.
- Email analysis
- Header analysis
- Sender impersonation checks
- DKIM validation
- SPF validation
- Scripting and data formats
- JSON
- Python
- PowerShell
- Shell scripting
- XML
- Sandboxing
- Runs untrusted code in an isolated environment for safe testing.
Threat intelligence and hunting
- Threat actors
- Advanced persistent threats (APT)
- Hacktivists
- Organized crime
- Nation-state actors
- Script kiddies
- Insider threats
- TTPs
- Tactics, techniques, and procedures.
- Confidence levels
- Timeliness
- Relevancy
- Accuracy
- Collection methods
- Open-source intelligence (OSINT)
- Closed-source intelligence
- Threat intelligence sharing
- Incident response coordination
- Vulnerability management
- Risk management
- Security engineering
- Detection and monitoring
- Threat hunting techniques
- Indicators of compromise (IOC)
- Honeypots
- Active defense
- Configuration and misconfiguration analysis