Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Cyber Security Diploma Outlines

CCNA (Network fundamentals)


Remembering (Level1)
1. Study Networking Basics:
2. Learn Network Topologies:
3. Define TCP/IP Protocol Suite and how it works:
4. Identify IP Addressing and Subnetting:

Understanding Level 2
1. Describe Network Protocols and Technologies:
2. Understand and Restate Cisco IOS (Internetwork Operating System):
3. Explain IP Addressing and Subnetting:
4. Explain Routing and Switching:
Applying (Level 3)
1. Engage Hands-on Lab Practice:
2. Apply Network Design and Implementation:
3. Apply Implementing Security Measures:
4. Perform Network Documentation:
Network Security Fundamentals
Remembering (Level1)
1. List Key Security Terminology:
2. Define Network Security Concepts:
3. List to Remember Types of Attacks:
4. Recall various Security Controls and Technologies:
5. Remember Essential Network Security Best Practices:
Understanding (Level 2)
1. Describe Security Threats and Vulnerabilities:
2. Explain Network Security Architecture:
3. Delve into the principles of Cryptography and Encryption:
4. Discuss Access Control and Authentication:
5. Explain Security Incident Response:
6. Discuss Network Security:
Applying (Level 3)
1. Apply Security Configuration:
2. Present Network Monitoring and Incident Response:
3. Use Vulnerability Assessments To make Penetration Testing:
4. Use Security Policy in Firewall (GNS3) Implementation:
Analyzing (Level 4)
1. Classify Risk Assessment:
2. Security Incident Analysis:
3. Network Traffic Analysis:
4. Explain Security Architecture Review by Diagram:
5. Classify Security Policy and Compliance Review:
6. Classify Vulnerability Assessment and Penetration Testing Analysis:
Evaluate (Level 5)
1. Assess the effectiveness of Security Control Assessment:
2. Evaluate the efficiency and effectiveness of Security Incident Response Evaluation:
3. Evaluate the Network's Compliance Assessment:
4. Evaluate the likelihood of occurrence and the severity of Security Risk:
SIEM (Qradar):
Applying (Level 3)
1. SIEM Deployment and Configuration:
2. Configure the SIEM tool to collect and aggregate Logs and Events:
3. Rule Creation and Alert Configuration:
4. Incident Response Integration:
Analyzing SIEM Tool (Level 4)
1. Analyze Log and Event data collected by the SIEM:
2. Evaluate Incident Triage:
3. Vulnerability Assessment Integration:

You might also like