Security professionals who want to prove their ability to work in IT systems with security tasks. Candidates must demonstrate a deeper understanding of information security than simple terminology.
Application Security The candidate must demonstrate an understanding of how to protect applications from malware and other common threats.
Computer Math The candidate must have a good understanding of foundational numbering system.
Cryptographic Algorithms & Attacks The candidate will demonstrate a good understanding of cryptographic algorithms.
Cryptography Fundamentals The candidate will have a good understanding of cryptography and its applications.
History of Cryptography: The candidate will be able to demonstrate an understanding of cryptography throughout the history.
Network Addressing and Protocols: The candidate will demonstrate a good understanding of protocol and network addressing.
Network Attacks The candidate must demonstrate a solid understanding of network attacks.
Network Communication Fundamentals: The candidate must have a good understanding of network terminology and concepts.
Network Security Technology The candidate must demonstrate an understanding of countermeasures, technologies used to minimize attacks' risks.
Principles of Security Policy and Risk Management The candidate will be able to demonstrate an understanding of the fundamental concepts of information security and risk management, as well as the components that make up effective policy creation and awareness programs.
Systems Security The candidate must demonstrate an understanding of how to secure systems from common threats.
Wireless Security Technology: The candidate will need to be able to understand wireless technologies and the defenses that are used to minimize the risks of wireless attacks.