· Complexities of working in the Cyber Security Industry · Legal and ethical issues of working in cyber environment · Threats, vulnerabilities, and exploits · Network architectures and recognise their potential vulnerabilities · Reconnaissance methodologies to discover weaknesses in computing environment · The differences between vulnerability management policies and vulnerability management maturity models · Concepts of exploiting vulnerabilities to hack into a system using common penetration testing tools and frameworks · The principles of symmetric and asymmetric cryptography, and public key infrastructure · Data classification levels and email marking standards associated with the dissemination of sensitive and classified information · Data classification levels and email marking standards associated with the dissemination of sensitive and classified information · Threats in social networks via Open-Source Intelligence (OSINT) Methodologies and demonstrate the capturing of Personally Identifiable Information (PII) using OSINT · Usage of website security assessment tools to identify weaknesses and potential web attack vectors · The types of forensic investigations from a cybersecurity perspective, differentiating between software and hardware digital forensic tools · The resources required to navigate the cybersecurity landscape as a potential cybersecurity professional |