| Week 2 – 30 pages and 30 multiple choice questions | |||||||
|---|---|---|---|---|---|---|---|
| Read Chapters 1, 2 and 3 again | |||||||
| Chapter 4 – Explain the importance of using appropriate cryptographic solutions – 15 pages
Chapter 5 – Compare and contrast common threat actors and motivations – 6 pages Chapter 6 – Explain common threat vectors and attack surfaces – 9 pages |
|||||||
| Action – Ian’s Book | Key Elements | ||||||
|
PKI
Encryption Tools Obfuscation Hashing Salting Digital signatures Blockchain Open public ledger Certificates Threat actors Attributes of actors Motivations of threat actors Message based attacks Image based attacks Voice Calls Vulnerable software Unsupported systems and applications Unsecure networks Open service ports Default credentials Supply chain Social engineering
|
||||||