Objectives
Research and analyze what it takes to become a network defender
Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets…
Objectives
Research and analyze cyber security incidents
Background / Scenario
In 2016, it was estimated that businesses lost $400 million dollars annually to cyber criminals.…
Objectives
Research and analyze IoT application vulnerabilities
Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting every…
Objectives
Research and analyze cyber security incidents
Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and…
Objectives
Part 1: Prepare a Personal Computer for Virtualization
Part 2: Import a Virtual Machine into VirtualBox Inventory
Background / Scenario
Computing power and…
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative…
What is the responsibility of the human resources department when handing a security incident as defined by NIST?
Review the incident policies, plans, and procedures for…
What are three functions provided by the syslog service? (Choose three.)
to provide statistics on packets that are flowing through a Cisco device
to select the type of…
What is a chain of custody?
The documentation surrounding the preservation of evidence related to an incident *
A list of all of the stakeholders that were exploited by an…