CSX-Fundamentos de Ciberseguridad
CSX-Fundamentos de Ciberseguridad
CSX-Fundamentos de Ciberseguridad
KNOWLEDGE STATEMENTS
1.2
1.3
Knowledge of risk management processes, including steps and methods for assessing risk.
1.4
Knowledge of threat actors (e.g., script kiddies, non-nation state sponsored and nation state
sponsored).
1.5
1.6
1.7
1.8
2.2
2.3
2.4
Knowledge of information technology (IT) security principles and methods (e.g., firewalls,
demilitarized zones, encryption).
2.5
2.6
2.7
Knowledge of intrusion detection methodologies and techniques for detecting host- and
network-based intrusions via intrusion detection technologies.
2.8
2.9
2.10
Knowledge of cryptography.
2.11
2.12
Knowledge of how traffic flows across the network (i.e. transmission and encapsulation)
2.13
Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol
[TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain
Name System [DNS]).
Knowledge of vulnerability assessment tools, including open source tools, and their
capabilities.
3.2
3.3
3.4
3.5
Knowledge of network systems management principles, models, methods (e.g., end-to- end
systems performance monitoring) and tools.
3.6
3.7
3.8
3.9
Knowledge of system life cycle management principles, including software security and
usability.
3.10
Knowledge of local specialized system requirements (e.g., critical infrastructure systems that
may not use standard information technology [IT]) for safety, performance and reliability.
3.11
Knowledge of system and application security threats and vulnerabilities (e.g., buffer
overflow, mobile code, cross-site scripting, Procedural Language/Structured Query
Language [PL/SQL] and injections, race conditions, cover channel, replay, return- oriented
attacks, malicious code).
3.12
3.13
3.14
3.15
Knowledge of communication methods, principles and concepts that support the network
infrastructure.
3.16
Knowledge of the common networking protocols (e.g., Transmission Control Protocol and
Internet Protocol [TCP/IP]) and services (e.g., web, email, Domain Name System [DNS]) and
how they interact to provide network communications.
3.17
Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide
Area Network [WAN], Metropolitan Area Network [MAN], Wireless Local Area Network [WLAN],
Wireless Wide Area Network [WWAN]).
3.18
3.19
3.20
4.2
4.3
4.4
4.5
Knowledge of processes for seizing and preserving digital evidence (e.g., chain of
custody).
4.6
4.7
4.8
4.9
4.10
4.11
Knowledge of which system files (e.g., log files, registry files, configuration files) contain
relevant information and where to find those system files.
5.2
5.3
5.4
5.5
5.6