I Hack I Conquer
  • Welcome to Aleš Tománek's notes on Cyber
  • Certificates & Badges
    • THM Badges
    • Open Uni Cyber Foundations Badges
  • Enumeration
    • Nmap
      • Nmap List of Commands
      • Experimenting with nmap
    • Gobuster
    • Wireshark: The basics
    • TCPDump
    • Nikto
    • WPScan
  • LINUX
    • 🍕Linux Scripting
    • Random linux notes
  • Windows
    • Sysmon
  • Cisco Networking Academy
    • Networking Basics - 17 Modules
    • Networking Devices and Initial Configuration
    • Endpoint Security
    • Network Defence
    • Cyber Threat Management
  • TryHackMe.com Cyber Security 101 - Notes
    • Computer Networking
      • Networking Core Protocols
        • DNS (Domain Name System)
        • WHOIS
        • HTTP(S) (Hypertext Transfer Protocol (Secure))
        • FTP (File Transfer Protocol)
        • EMAIL: STMP, POP3, IMAP
          • Sending email: SMTP (Simple Mail Transfer Protocol)
          • Receiving email: POP3 (Post Office Protocol v3)
          • Synchronising email: IMAP(Internet Message Access Protocol)
      • Networking Essentials
        • DHCP (Dynamic Host Configuration Protocol)
        • (ARP) Address Resolution Protocol
        • ICMP: Troubleshooting Networks
        • Routing
        • NAT (Network Address Translation)
        • MAC address
      • Networking Concepts
        • OSI Model
        • TCP/IP Model
        • IP Addresses and Subnets
        • UPD and TCP
        • Encapsulation
        • TELNET
      • Networking Secure Protocols
      • Principles of Information Security
    • Cryptography
      • Hashing Basics
        • Using Hashing for Secure Password Storage
        • Recognising Password Hashes
        • Recognising Password Hashes
        • Password Cracking
        • Hashing for Integrity Checking
      • Cryptography Basics
      • Public Key Cryptography Basics
        • RSA
        • Diffie-Hellman Key Exchange
        • SSH
        • Digital Signatures and Certificates
        • PGP and GPG
      • John the Ripper: The Basics
    • Exploitation Basics
      • Metasploit
        • Commands
        • Msfvenom
      • Moniker Link (CVE-2024-21413)
      • CVE-2021-41773/42013
    • Web Hacking
      • Web Application Basics
      • Javascript Essentials
      • SQL Fun.damentals
    • Offensive Security Tooling
      • SQLMap: The Basics
      • Hydra
      • Shells Overview
    • Defensive Security
      • SOC Fundamentals
      • Digital Forensics Fundamentals
      • CAPA: The Basics
    • Security Solutions
      • Intrusion Detection Systems Fundamentals
  • NCFE L3 Cyber - Assignments and Feedback
    • UNIT 1 | Understanding cyber security principles
      • 1. Describe the concepts of cyber security (AC 1.1)
      • 2. Explain the importance of cyber security (AC 1.2)
      • 3. Describe the consequences and implications of inadequate cyber security (AC 1.3)
      • 4. Define core terminology used in cyber security (AC 2.1)
      • 5. Explain the terms good actors and bad actors (AC 2.2)
      • 6. Distinguish typical behaviours of good actors and bad actors (AC 2.3)
      • 7. Explain the motivations of good actors and bad actors (AC 2.4)
      • 8. Identify key sectors that are most vulnerable to a cyber-attack (AC 2.5)
      • 9. Compare the motivations for a cyber-attack in key sectors (AC 2.6)
      • 10. Consider how an actor may carry out a cyber-attack (AC 2.7)
      • 11. Describe the term security by design (AC 3.1)
      • 12. Explore the principles of security by design (AC 3.2)
      • 13. State the consequences of not considering cyber security during the design phase (AC 3.3)
      • 14. Evaluate the advantages and disadvantages of security by design (AC 3.4)
    • UNIT 2 | Threat intelligence in cyber security
      • 1. Identify key concepts of cyber threat intelligence (AC 1.1)
      • 2. Explain the following terms in relation to cyber security (AC 1.2)
      • 3. Describe the threat intelligence lifecycle (AC 1.3)
      • 4. Describe how to find out about emerging attack techniques and how to recognise them (AC 1.4)
      • 5. Consider what could be included in Open Source Intelligence data sets (AC 1.5)
      • 6. Explain why it is important to only use reliable and valid sources of Open Source Intelligence in
      • 7. Explain the importance of using reliable sources of information in relation to cyber security thr
      • 8. Consider the current threat status and make possible recommendations based upon cyber threat inte
      • 9. Analyse relevant cyber threat intelligence information requirements for an organisation (AC 1.9)
      • 10. Describe a range of threat models (AC 2.1)
      • 11. Explain the steps within a threat model (AC 2.2)
      • 12. Evaluate a threat model (AC 2.3)
      • 13. Identify types of malicious software (AC 3.1)
      • 14. Describe the effects of different types of malicious software on an infected system (AC 3.2)
      • 15. Describe the motives for using specific malicious software attacks (AC 3.3)
      • 16. Identify how specific malicious software attacks are made more effective due to human factors (A
      • 17. Explain the term ‘social engineering’ (AC 4.1)
      • 18. Give examples of how Open Source Intelligence can be used for social engineering (AC 4.2)
      • 19. Describe ways a social engineering attack could take place (AC 4.3)
    • UNIT3 | Cyber security testing, vulnerabilities and controls
      • 1. Explain different types of cyber security testing (AC 1.1)
      • 2. Identify why cyber security testing is important (AC 1.2)
      • 3. Compare types of cyber security testing (AC 1.3)
      • 4. Consider mitigations following cyber security testing (AC 1.4)
      • 5. Explain why it is important to retest following any changes made (AC 1.5)
      • 6. Explain how the outcomes of cyber security testing can be reported (AC 1.6)
      • 7. Explain why the outcomes of cyber security testing must be reported (AC 1.7)
      • 8. Identify cyber security vulnerabilities (AC 2.1)
      • 9. Demonstrate the steps to be taken when a vulnerability has been identified (AC 2.2)
      • 10. Apply the correct response to the vulnerability (AC 2.3)
      • 11. Develop an appropriate communication to mitigate future vulnerabilities (AC 2.4)
      • 12. Identify cyber security controls (AC 3.1)
      • 13. Explain a basic cyber security framework (AC 3.2)
      • 14. Evaluate a cyber security framework (AC 3.3)
      • 15. Explain how to apply controls (AC 4.1)
      • 16. Implement a basic cyber security control (AC 4.2)
      • 17. Justify the implementation of the chosen cyber security control (AC 4.3)
      • 18. Explain why a control might not be applied (AC 4.4)
    • UNIT 4 | Cyber security incident response
      • 1. Describe what a cyber security incident response plan is used for (AC 1.1)
      • 2. Explain when a cyber security incident response plan is used (AC 1.2)
      • 3. Describe the stages of a cyber security incident response lifecycle (AC 1.3)
      • 4. Explain why it is important to maintain an up to date cyber security incident log (AC 2.1)
      • 5. Explain the steps to be included within a cyber security incident response plan (AC 2.2)
      • 6. Explain why it is important to have a cyber security incident response plan (AC 2.3)
      • 7. Develop a cyber security incident response plan for an organisation (AC 2.4)
      • 8. Explain what is meant by incident post mortem (AC 3.1)
      • 9. Explain the structure of an incident post mortem (AC 3.2)
      • 10a. Consider the importance of the following when carrying out an incident post mortem (AC 3.3) in
        • 10a. Integrity
        • 10b. Rigour
        • 10c. Discipline
      • 11. Create a post mortem report of an incident (AC 3.4)
      • 12. Reflect upon the report and make recommendations based on the findings (AC 3.5)
    • UNIT 5 | Understand legislation and ethical conduct within cyber security
      • 1. Describe how legislation impacts on cyber security (AC 1.1)
      • 2. Explain trends in international law for cyberspace (AC 1.2)
      • 3. Identify ISO standards related to cyber security (AC 2.1)
      • 4. Explain how ISO standards are used to support cyber security (AC 2.2)
      • 5. Describe ethical conduct within cyber security (AC 3.1)
      • 6. Identify unethical conduct within cyber security (AC 3.2)
    • UNIT 6 | Professional skills and behaviours for cyber security
      • 1. Explain the importance of managing and promoting a positive digital identity (AC 1.1)
      • 2. Describe possible employee screening checks that an employer might carry out (AC 1.2)
      • 3. Consider potential consequences of unsatisfactory findings as a result of employer checks (AC 1.3
      • 4. Describe the following security clearance levels (AC 1.4)
        • BPSS (Baseline Personnel Security Standard)
        • SC (Security Checked)
        • DV (Developed Vetting)
      • 5. Explain how bias can influence cyber security (AC 1.5)
      • 6. Describe the benefits of a security by design mindset (AC 1.6)
      • 7. Identify skills required for a career in cyber security (AC 2.1)
      • 8. Perform a personal skills analysis (AC 2.2)
      • 9. Assess own skills against those required for a career in cyber security (AC 2.3)
      • 10. Create a personal development plan (AC 2.4)
      • 11. Explain the term continuous professional development (CPD) (AC 3.1)
      • 12. State methods of keeping up to date with industry knowledge (AC 3.2)
      • 13. Explain why it is important to keep CPD up to date (AC 3.3)
  • Open Uni - Cyber Foundations - Notes
  • Python - 100 Days of Code: The Complete Python Pro Bootcamp - Notes
    • THM Python
    • Day 1 - Band Name Generator Project
    • Day 2 - Tip Calculator Project
    • Page 3
  • Random Experiments
    • Web enum of advis-marketing.cz
  • Unsorted notes on everything
  • Contact me
  • 01000101 01110110 01101001 01100011 01101011 01100001
Powered by GitBook
On this page

Welcome to Aleš Tománek's notes on Cyber

Latest stuff I've been learning

Cisco Networking AcademyOpen Uni - Cyber Foundations - NotesNCFE L3 Cyber - Assignments and FeedbackTryHackMe.com Cyber Security 101 - NotesPython - 100 Days of Code: The Complete Python Pro Bootcamp - NotesRandom ExperimentsCertificates & BadgesMsfvenom

Last updated 2 days ago