· Complexities of working in the Cyber Security Industry
· Legal and ethical issues of working in cyber environment
· Threats, vulnerabilities, and exploits
· Network architectures and recognise their potential vulnerabilities
· Reconnaissance methodologies to discover weaknesses in computing environment
· The differences between vulnerability management policies and vulnerability management maturity models
· Concepts of exploiting vulnerabilities to hack into a system using common penetration testing tools and frameworks
· The principles of symmetric and asymmetric cryptography, and public key infrastructure
· Data classification levels and email marking standards associated with the dissemination of sensitive and classified information
· Data classification levels and email marking standards associated with the dissemination of sensitive and classified information
· Threats in social networks via Open-Source Intelligence (OSINT) Methodologies and demonstrate the capturing of Personally Identifiable Information (PII) using OSINT
· Usage of website security assessment tools to identify weaknesses and potential web attack vectors
· The types of forensic investigations from a cybersecurity perspective, differentiating between software and hardware digital forensic tools
· The resources required to navigate the cybersecurity landscape as a potential cybersecurity professional |