Reading Time: 2 minutes Explain the purpose of practices used to secure a corporate environment. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Penetration Testing Penetration testing is performed by security analysts to test a network to see where security improvements can be made. The testing could be external or internal and may vary in scope. A definition […]
Reading Time: 2 minutes The Common Vulnerability Scoring System (CVSS) is part of the Security Content Automation Protocol (SCAP). It allows security researchers to quantitatively evaluate the risk posed by a vulnerability. CVSS is comprised of three metric groups. The scoring ranges from 0-10. For the purposes of the current version of the exam (as of 1/1/2019), CVSS v2 […]
Reading Time: 1 minute The Security Content Automation Protocol (SCAP) is a standard that defines how software flaws and configuration errors are classified. Four components make up SCAP. Common Configuration Enumeration (CCE) The Common Configuration Enumeration (CCE) is a list of best practices maintained by the National Institute of Standards and Technology (NIST). They may be downloaded from the […]
Reading Time: 3 minutes Given a network-based threat, implement or recommend the appropriate response and countermeasure. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 For this objective we will explore some potential countermeasures and controls to help secure a network and what kinds of attacks they may thwart. Network Segmentation One of the most basic things that can […]
Reading Time: 1 minute Given a scenario, analyze the results of a network reconnaissance. CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 While gathering the reconnaissance about a network, the data must be turned into actionable information. The first type of analysis is the point in time analysis. Sources for such analysis may include packet captures, Netflow and […]
Reading Time: 4 minutes One of the first things both attackers and defenders do is to reconnoiter the network that they are attacking or defending. “Time spent on reconnaissance is seldom wasted.” – Duke of Wellington Arthur Wellesley. This is true in cybersecurity just like war. We must know what we’re defending if we have any hope of defending it.
Reading Time: 1 minute Security has always been an important component in being a Network Engineer. Today’s Internet of Things (IoT) and the growing number of cyber attacks has made it even more crucial. Because of this, I’ve decided to go back into the Security realm of certification coursework and exams. It has been over a decade since I […]