Risk mitigation
Cybersecurity risk mitigation
Security awareness training
Security program elements (formal security training)
Network security risk mitigation best practices
Good password management
Avoiding misconfiguration mistakes
Implementing defense in depth (e.g., layered security)
Implementing the principle of least privilege
Implementing Information Assurance (IA) approaches to information management
Cybersecurity risk mitigation skills
An information security policy covering:
Software development and testing/software security
Network design and testing/network security
Hardware security policy
Standard operating procedures/information command and control policy
Ethical code of conduct
Security awareness training
User responsibility/usage policies (AUP)
Information security risk governance (cybersecurity regulations and IT governance compliance frameworks)
Cybersecurity risk mitigation framework
Technical hacking skills
IT governance
Cybersecurity regulations/regulatory requirements Security and privacy policies and regulations • Regulatory compliance—FERPA • Regulatory compliance—PCI DSS
IT security governance
Key IT governance/cybersecurity compliance frameworks GRC/IA/QA approaches to IT security governance to help implement regulatory requirements/achieve compliance
SDLC/agile software development/Design of security system and components DevSecOps/security-by-design
Security testing
Security awareness
Defense in depth
Access management
Access control Access and authentication IAM User security (passwords, identity, biometry)
Social engineering and critical thinking skills
Application security
Cross site scripting attacks SQL injection attacks
Operating system security
Layered security: IDS/IPS, firewalls, software security
Basic Cryptography and Tools
Cryptography, Key exchange, Security Policies; Encryption
Network protocols
Common network protocols Internet Protocol Suite (the TCP/IP protocol suite) The TCP/IP model and the OSI model
Network enumeration and scanning techniques and technologies
Open technologies AI based intelligence gathering/surveillance technologies
Types of network attacks (passive and active)
Social hacking skills
Risk mitigation component Countermeasures component
Ethical-legal consequences/prevention component Security audit/comprehensive approach to hacking/security testing (vulnerability discovery and mitigation)
Interdisciplinary educational lens (a social science content/context) The ethics of ethical hackers (professionalism/professional practice in society)
Social hacking values (tacit sociopolitical values made explicit) Philosophy of science/scientific method Science of security content
References
Last updated