I Hack I Conquer
CtrlK
  • Welcome to Aleš Tománek's notes on Cyber
  • Certificates & Badges
    • THM Badges
    • Open Uni Cyber Foundations Badges
  • Enumeration
    • Nmap
      • Nmap List of Commands
      • Experimenting with nmap
    • Gobuster
    • Wireshark: The basics
    • TCPDump
    • Nikto
    • WPScan
  • LINUX
    • 🍕Linux Scripting
    • Random linux notes
  • Windows
    • Sysmon
  • Cisco Networking Academy
    • Networking Basics - 17 Modules
    • Networking Devices and Initial Configuration
    • Endpoint Security
    • Network Defence
    • Cyber Threat Management
  • TryHackMe.com Cyber Security 101 - Notes
    • Computer Networking
      • Networking Core Protocols
        • DNS (Domain Name System)
        • WHOIS
        • HTTP(S) (Hypertext Transfer Protocol (Secure))
        • FTP (File Transfer Protocol)
        • EMAIL: STMP, POP3, IMAP
          • Sending email: SMTP (Simple Mail Transfer Protocol)
          • Receiving email: POP3 (Post Office Protocol v3)
          • Synchronising email: IMAP(Internet Message Access Protocol)
      • Networking Essentials
        • DHCP (Dynamic Host Configuration Protocol)
        • (ARP) Address Resolution Protocol
        • ICMP: Troubleshooting Networks
        • Routing
        • NAT (Network Address Translation)
        • MAC address
      • Networking Concepts
        • OSI Model
        • TCP/IP Model
        • IP Addresses and Subnets
        • UPD and TCP
        • Encapsulation
        • TELNET
      • Networking Secure Protocols
      • Principles of Information Security
    • Cryptography
      • Hashing Basics
        • Using Hashing for Secure Password Storage
        • Recognising Password Hashes
        • Recognising Password Hashes
        • Password Cracking
        • Hashing for Integrity Checking
      • Cryptography Basics
      • Public Key Cryptography Basics
        • RSA
        • Diffie-Hellman Key Exchange
        • SSH
        • Digital Signatures and Certificates
        • PGP and GPG
      • John the Ripper: The Basics
    • Exploitation Basics
      • Metasploit
        • Commands
        • Msfvenom
      • Moniker Link (CVE-2024-21413)
      • CVE-2021-41773/42013
    • Web Hacking
      • Web Application Basics
      • Javascript Essentials
      • SQL Fun.damentals
    • Offensive Security Tooling
      • SQLMap: The Basics
      • Hydra
      • Shells Overview
    • Defensive Security
      • SOC Fundamentals
      • Digital Forensics Fundamentals
      • CAPA: The Basics
    • Security Solutions
      • Intrusion Detection Systems Fundamentals
  • NCFE L3 Cyber - Assignments and Feedback
    • UNIT 1 | Understanding cyber security principles
      • 1. Describe the concepts of cyber security (AC 1.1)
      • 2. Explain the importance of cyber security (AC 1.2)
      • 3. Describe the consequences and implications of inadequate cyber security (AC 1.3)
      • 4. Define core terminology used in cyber security (AC 2.1)
      • 5. Explain the terms good actors and bad actors (AC 2.2)
      • 6. Distinguish typical behaviours of good actors and bad actors (AC 2.3)
      • 7. Explain the motivations of good actors and bad actors (AC 2.4)
      • 8. Identify key sectors that are most vulnerable to a cyber-attack (AC 2.5)
      • 9. Compare the motivations for a cyber-attack in key sectors (AC 2.6)
      • 10. Consider how an actor may carry out a cyber-attack (AC 2.7)
      • 11. Describe the term security by design (AC 3.1)
      • 12. Explore the principles of security by design (AC 3.2)
      • 13. State the consequences of not considering cyber security during the design phase (AC 3.3)
      • 14. Evaluate the advantages and disadvantages of security by design (AC 3.4)
    • UNIT 2 | Threat intelligence in cyber security
      • 1. Identify key concepts of cyber threat intelligence (AC 1.1)
      • 2. Explain the following terms in relation to cyber security (AC 1.2)
      • 3. Describe the threat intelligence lifecycle (AC 1.3)
      • 4. Describe how to find out about emerging attack techniques and how to recognise them (AC 1.4)
      • 5. Consider what could be included in Open Source Intelligence data sets (AC 1.5)
      • 6. Explain why it is important to only use reliable and valid sources of Open Source Intelligence in
      • 7. Explain the importance of using reliable sources of information in relation to cyber security thr
      • 8. Consider the current threat status and make possible recommendations based upon cyber threat inte
      • 9. Analyse relevant cyber threat intelligence information requirements for an organisation (AC 1.9)
      • 10. Describe a range of threat models (AC 2.1)
      • 11. Explain the steps within a threat model (AC 2.2)
      • 12. Evaluate a threat model (AC 2.3)
      • 13. Identify types of malicious software (AC 3.1)
      • 14. Describe the effects of different types of malicious software on an infected system (AC 3.2)
      • 15. Describe the motives for using specific malicious software attacks (AC 3.3)
      • 16. Identify how specific malicious software attacks are made more effective due to human factors (A
      • 17. Explain the term ‘social engineering’ (AC 4.1)
      • 18. Give examples of how Open Source Intelligence can be used for social engineering (AC 4.2)
      • 19. Describe ways a social engineering attack could take place (AC 4.3)
    • UNIT3 | Cyber security testing, vulnerabilities and controls
      • 1. Explain different types of cyber security testing (AC 1.1)
      • 2. Identify why cyber security testing is important (AC 1.2)
      • 3. Compare types of cyber security testing (AC 1.3)
      • 4. Consider mitigations following cyber security testing (AC 1.4)
      • 5. Explain why it is important to retest following any changes made (AC 1.5)
      • 6. Explain how the outcomes of cyber security testing can be reported (AC 1.6)
      • 7. Explain why the outcomes of cyber security testing must be reported (AC 1.7)
      • 8. Identify cyber security vulnerabilities (AC 2.1)
      • 9. Demonstrate the steps to be taken when a vulnerability has been identified (AC 2.2)
      • 10. Apply the correct response to the vulnerability (AC 2.3)
      • 11. Develop an appropriate communication to mitigate future vulnerabilities (AC 2.4)
      • 12. Identify cyber security controls (AC 3.1)
      • 13. Explain a basic cyber security framework (AC 3.2)
      • 14. Evaluate a cyber security framework (AC 3.3)
      • 15. Explain how to apply controls (AC 4.1)
      • 16. Implement a basic cyber security control (AC 4.2)
      • 17. Justify the implementation of the chosen cyber security control (AC 4.3)
      • 18. Explain why a control might not be applied (AC 4.4)
    • UNIT 4 | Cyber security incident response
      • 1. Describe what a cyber security incident response plan is used for (AC 1.1)
      • 2. Explain when a cyber security incident response plan is used (AC 1.2)
      • 3. Describe the stages of a cyber security incident response lifecycle (AC 1.3)
      • 4. Explain why it is important to maintain an up to date cyber security incident log (AC 2.1)
      • 5. Explain the steps to be included within a cyber security incident response plan (AC 2.2)
      • 6. Explain why it is important to have a cyber security incident response plan (AC 2.3)
      • 7. Develop a cyber security incident response plan for an organisation (AC 2.4)
      • 8. Explain what is meant by incident post mortem (AC 3.1)
      • 9. Explain the structure of an incident post mortem (AC 3.2)
      • 10a. Consider the importance of the following when carrying out an incident post mortem (AC 3.3) in
        • 10a. Integrity
        • 10b. Rigour
        • 10c. Discipline
      • 11. Create a post mortem report of an incident (AC 3.4)
      • 12. Reflect upon the report and make recommendations based on the findings (AC 3.5)
    • UNIT 5 | Understand legislation and ethical conduct within cyber security
      • 1. Describe how legislation impacts on cyber security (AC 1.1)
      • 2. Explain trends in international law for cyberspace (AC 1.2)
      • 3. Identify ISO standards related to cyber security (AC 2.1)
      • 4. Explain how ISO standards are used to support cyber security (AC 2.2)
      • 5. Describe ethical conduct within cyber security (AC 3.1)
      • 6. Identify unethical conduct within cyber security (AC 3.2)
    • UNIT 6 | Professional skills and behaviours for cyber security
      • 1. Explain the importance of managing and promoting a positive digital identity (AC 1.1)
      • 2. Describe possible employee screening checks that an employer might carry out (AC 1.2)
      • 3. Consider potential consequences of unsatisfactory findings as a result of employer checks (AC 1.3
      • 4. Describe the following security clearance levels (AC 1.4)
        • BPSS (Baseline Personnel Security Standard)
        • SC (Security Checked)
        • DV (Developed Vetting)
      • 5. Explain how bias can influence cyber security (AC 1.5)
      • 6. Describe the benefits of a security by design mindset (AC 1.6)
      • 7. Identify skills required for a career in cyber security (AC 2.1)
      • 8. Perform a personal skills analysis (AC 2.2)
      • 9. Assess own skills against those required for a career in cyber security (AC 2.3)
      • 10. Create a personal development plan (AC 2.4)
      • 11. Explain the term continuous professional development (CPD) (AC 3.1)
      • 12. State methods of keeping up to date with industry knowledge (AC 3.2)
      • 13. Explain why it is important to keep CPD up to date (AC 3.3)
  • Open Uni - Cyber Foundations - Notes
  • Python - 100 Days of Code: The Complete Python Pro Bootcamp - Notes
    • THM Python
    • Day 1 - Band Name Generator Project
    • Day 2 - Tip Calculator Project
    • Page 3
  • Random Experiments
    • Web enum of advis-marketing.cz
  • Unsorted notes on everything
  • Contact me
  • 01000101 01110110 01101001 01100011 01101011 01100001
Powered by GitBook
On this page
  1. NCFE L3 Cyber - Assignments and Feedback
  2. UNIT 6 | Professional skills and behaviours for cyber security

4. Describe the following security clearance levels (AC 1.4)

BPSS (Baseline Personnel Security Standard)SC (Security Checked)DV (Developed Vetting)
Previous3. Consider potential consequences of unsatisfactory findings as a result of employer checks (AC 1.3NextBPSS (Baseline Personnel Security Standard)