-
-Hacker Characteristic
-Identify the NIST/NICE Cybersecurity Speciality Area
-Identify Cybersecurity Countermeasure used to Thwart Cyber criminal -
-Principles of Cybersecurity
-Identify the state of Data for a Given technology
-Identify the ISO/IEC 27000 Domains and Controls
-Identify the counter measure category -
-Identify the type of malicious code
-Identify the email and browser attack
-Identify social engineering principles
-Identify social engineering threats -
-Using Symmetrical Encryption
-Using Asymmetrical Encryption
-Identify using Symmetrical and Asymmetrical Encryption
-Identify Access and Control Strategies
-Identify Authentication method -
-
Advantage and disadvantage of Caesar Cipher
How to improve Caesar Cipher -
Advantage and disadvantage of Vigenère Analysis
-
-