<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mmarco</id>
	<title>LPI Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mmarco"/>
	<link rel="alternate" type="text/html" href="https://wiki.lpi.org/wiki/Special:Contributions/Mmarco"/>
	<updated>2026-05-14T03:07:11Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5323</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5323"/>
		<updated>2019-05-28T14:25:12Z</updated>

		<summary type="html">&lt;p&gt;Mmarco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The Candidate has a basic understanding of the major security threats of using computers, networks, connected devices and IT service on premise and in the cloud. The candidate understands common ways to prevent, mitigate and prevent attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on local storage media and in the cloud. The candidate is able to apply common security tools, protect private information and secure their identity. The candidate is able to take responsibility for securing their own devices and making use of IT services.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals (confidentiality, integrity and availability, non repudiation)&lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security (hackers, crackers, black hat, white hat)&lt;br /&gt;
&lt;br /&gt;
* Awareness of industrial espionage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behaviour (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidates should understand the implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications of one’s actions on others&lt;br /&gt;
&lt;br /&gt;
* Handling of personal and confidential information in a responsible way&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore candidates should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of hash functions&lt;br /&gt;
&lt;br /&gt;
* Awareness of most important cryptographic algorithms &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how certificates are associated with a subject and an issuer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSL Labs Server Test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of GPG for email encryption. This includes handling one’s own and foreign GPG keys and sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of GPG&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of key servers&lt;br /&gt;
&lt;br /&gt;
* Using GPG for Email encryption (using Enigmail and Thunderbird on Windows, Linux or OS X)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of data, file and storage device be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in a container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in the cloud &lt;br /&gt;
&lt;br /&gt;
* Awareness of Bitlocker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of USB devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of Bluetooth devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of RFID devices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local packet filters, endpoint firewalls and application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of malware (virus, ransomware, trojan horses, adware, cryptominers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of spying (file copy, keylogging, camera and microphone hijacking)&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of data and address books copies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of keyloggers&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of data access and sharing in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups (full, differential, incremental backups, backup retention)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Local Network Access Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how devices are connected to a local network and and which threats result from physical media access. Furthermore, candidates should be able to securely connect to a wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP networks and the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP addresses and ports&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind routing and network providers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media (wired and WiFi)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of unencrypted / Public WiFi&lt;br /&gt;
&lt;br /&gt;
* Understanding and using of WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Internet Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of the Internet and routed networks. This includes understanding how connections to cloud services are established and understanding common threats against services on the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of botnets&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of clouds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of a VPN provider&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of gateway packet filters&lt;br /&gt;
&lt;br /&gt;
* Awareness of TOR and the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi factor authentication as well as being aware of common threats against individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager (keepass2)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks of traditional password memorization compared to password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing&lt;br /&gt;
&lt;br /&gt;
* Understanding of Social Engineering&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Trustworthiness (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to judge the trustworthiness and correctness of information on the internet. This includes understanding how search engines work and rank their results, knowing common criteria for recognizing fake news, spam messages and scam.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of search engines and web index&lt;br /&gt;
&lt;br /&gt;
* Awareness of web archives&lt;br /&gt;
&lt;br /&gt;
* Recognition of fake news&lt;br /&gt;
&lt;br /&gt;
* Distinguishing fake and real URLs&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various services as well as being aware of common threats against personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering and profiling&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of identity theft&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of stalking&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cybermobbing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of doxxing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of fake profiles&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cookies and tracking&lt;br /&gt;
&lt;br /&gt;
* Configuring profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Managing contacts and privacy settings on social networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about own personal information (such as GDPR for companies based in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mmarco</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5322</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5322"/>
		<updated>2019-05-28T14:22:47Z</updated>

		<summary type="html">&lt;p&gt;Mmarco: /* Minimally Qualified Candidate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The Candidate has a basic understanding of the major security threats of using computers, networks, connected devices and IT service on premise and in the cloud. The candidate understands common ways to prevent, mitigate and prevent attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on local storage media and in the cloud. The candidate is able to apply common security tools, protect private information and secure their identity. The candidate is able to take responsibility for securing their own devices and making use of IT services.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals (confidentiality, integrity and availability, non repudiation)&lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security (hackers, crackers, black hat, white hat)&lt;br /&gt;
&lt;br /&gt;
* Awareness of industrial espionage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behaviour (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidates should understand the implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications of one’s actions on others&lt;br /&gt;
&lt;br /&gt;
* Handling of personal and confidential information in a responsible way&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore candidates should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of hash functions&lt;br /&gt;
&lt;br /&gt;
* Awareness of most important cryptographic algorithms &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how certificates are associated with a subject and an issuer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSL Labs Server Test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of GPG for email encryption. This includes handling one’s own and foreign GPG keys and sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of GPG&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of key servers&lt;br /&gt;
&lt;br /&gt;
* Using GPG for Email encryption (using Enigmail and Thunderbird on Windows, Linux or OS X)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of data, file and storage device be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in a container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in the cloud &lt;br /&gt;
&lt;br /&gt;
* Awareness of Bitlocker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of USB devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of Bluetooth devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of RFID devices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local packet filters, endpoint firewalls and application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of malware (virus, ransomware, trojan horses, adware, cryptominers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of spying (file copy, keylogging, camera and microphone hijacking)&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of data and address books copies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of keyloggers&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of data access and sharing in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups (full, differential, incremental backups, backup retention)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Local Network Access Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how devices are connected to a local network and and which threats result from physical media access. Furthermore, candidates should be able to securely connect to a wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP networks and the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP addresses and ports&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind routing and network providers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media (wired and WiFi)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of unencrypted / Public WiFi&lt;br /&gt;
&lt;br /&gt;
* Understanding and using of WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Internet Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of the Internet and routed networks. This includes understanding how connections to cloud services are established and understanding common threats against services on the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of botnets&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of clouds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of a VPN provider&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of gateway packet filters&lt;br /&gt;
&lt;br /&gt;
* Awareness of TOR and the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi factor authentication as well as being aware of common threats against individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager (keepass2)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks of traditional password memorization compared to password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing&lt;br /&gt;
&lt;br /&gt;
* Understanding of Social Engineering&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Trustworthiness (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to judge the trustworthiness and correctness of information on the internet. This includes understanding how search engines work and rank their results, knowing common criteria for recognizing fake news, spam messages and scam.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of search engines and web index&lt;br /&gt;
&lt;br /&gt;
* Awareness of web archives&lt;br /&gt;
&lt;br /&gt;
* Recognition of fake news&lt;br /&gt;
&lt;br /&gt;
* Distinguishing fake and real URLs&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various services as well as being aware of common threats against personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering and profiling&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of identity theft&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of stalking&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cybermobbing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of doxxing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of fake profiles&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cookies and tracking&lt;br /&gt;
&lt;br /&gt;
* Configuring profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Managing contacts and privacy settings on social networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about own personal information (such as GDPR for companies based in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mmarco</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5321</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5321"/>
		<updated>2019-05-28T14:22:00Z</updated>

		<summary type="html">&lt;p&gt;Mmarco: /* Translations of Objectives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The Candidate has a basic understanding of the major security threats of using computers, networks, connected devices and IT service on premise and in the cloud. The candidate understands common ways to prevent, mitigate and prevent attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on local storage media and in the cloud. The candidate is able to apply common security tools, protect private information and secure their identity. The candidate is able to take responsibility for securing their own devices and making use of IT services.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals (confidentiality, integrity and availability, non repudiation)&lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security (hackers, crackers, black hat, white hat)&lt;br /&gt;
&lt;br /&gt;
* Awareness of industrial espionage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behaviour (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidates should understand the implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications of one’s actions on others&lt;br /&gt;
&lt;br /&gt;
* Handling of personal and confidential information in a responsible way&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore candidates should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of hash functions&lt;br /&gt;
&lt;br /&gt;
* Awareness of most important cryptographic algorithms &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how certificates are associated with a subject and an issuer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSL Labs Server Test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of GPG for email encryption. This includes handling one’s own and foreign GPG keys and sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of GPG&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of key servers&lt;br /&gt;
&lt;br /&gt;
* Using GPG for Email encryption (using Enigmail and Thunderbird on Windows, Linux or OS X)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of data, file and storage device be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in a container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in the cloud &lt;br /&gt;
&lt;br /&gt;
* Awareness of Bitlocker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of USB devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of Bluetooth devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of RFID devices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local packet filters, endpoint firewalls and application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of malware (virus, ransomware, trojan horses, adware, cryptominers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of spying (file copy, keylogging, camera and microphone hijacking)&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of data and address books copies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of keyloggers&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of data access and sharing in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups (full, differential, incremental backups, backup retention)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Local Network Access Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how devices are connected to a local network and and which threats result from physical media access. Furthermore, candidates should be able to securely connect to a wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP networks and the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP addresses and ports&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind routing and network providers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media (wired and WiFi)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of unencrypted / Public WiFi&lt;br /&gt;
&lt;br /&gt;
* Understanding and using of WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Internet Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of the Internet and routed networks. This includes understanding how connections to cloud services are established and understanding common threats against services on the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of botnets&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of clouds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of a VPN provider&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of gateway packet filters&lt;br /&gt;
&lt;br /&gt;
* Awareness of TOR and the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi factor authentication as well as being aware of common threats against individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager (keepass2)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks of traditional password memorization compared to password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing&lt;br /&gt;
&lt;br /&gt;
* Understanding of Social Engineering&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Trustworthiness (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to judge the trustworthiness and correctness of information on the internet. This includes understanding how search engines work and rank their results, knowing common criteria for recognizing fake news, spam messages and scam.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of search engines and web index&lt;br /&gt;
&lt;br /&gt;
* Awareness of web archives&lt;br /&gt;
&lt;br /&gt;
* Recognition of fake news&lt;br /&gt;
&lt;br /&gt;
* Distinguishing fake and real URLs&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various services as well as being aware of common threats against personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering and profiling&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of identity theft&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of stalking&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cybermobbing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of doxxing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of fake profiles&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cookies and tracking&lt;br /&gt;
&lt;br /&gt;
* Configuring profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Managing contacts and privacy settings on social networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about own personal information (such as GDPR for companies based in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mmarco</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5320</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5320"/>
		<updated>2019-05-28T14:20:14Z</updated>

		<summary type="html">&lt;p&gt;Mmarco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The Candidate has a basic understanding of the major security threats of using computers, networks, connected devices and IT service on premise and in the cloud. The candidate understands common ways to prevent, mitigate and prevent attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on local storage media and in the cloud. The candidate is able to apply common security tools, protect private information and secure their identity. The candidate is able to take responsibility for securing their own devices and making use of IT services.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6|English]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(NL)|Dutch]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(FR)|French]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(DE)|German]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(IT)|Italian]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(JA)|Japanese]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals (confidentiality, integrity and availability, non repudiation)&lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security (hackers, crackers, black hat, white hat)&lt;br /&gt;
&lt;br /&gt;
* Awareness of industrial espionage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behaviour (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidates should understand the implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications of one’s actions on others&lt;br /&gt;
&lt;br /&gt;
* Handling of personal and confidential information in a responsible way&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore candidates should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of hash functions&lt;br /&gt;
&lt;br /&gt;
* Awareness of most important cryptographic algorithms &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how certificates are associated with a subject and an issuer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSL Labs Server Test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of GPG for email encryption. This includes handling one’s own and foreign GPG keys and sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of GPG&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of key servers&lt;br /&gt;
&lt;br /&gt;
* Using GPG for Email encryption (using Enigmail and Thunderbird on Windows, Linux or OS X)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of data, file and storage device be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in a container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in the cloud &lt;br /&gt;
&lt;br /&gt;
* Awareness of Bitlocker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of USB devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of Bluetooth devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of RFID devices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local packet filters, endpoint firewalls and application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of malware (virus, ransomware, trojan horses, adware, cryptominers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of spying (file copy, keylogging, camera and microphone hijacking)&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of data and address books copies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of keyloggers&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of data access and sharing in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups (full, differential, incremental backups, backup retention)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Local Network Access Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how devices are connected to a local network and and which threats result from physical media access. Furthermore, candidates should be able to securely connect to a wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP networks and the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP addresses and ports&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind routing and network providers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media (wired and WiFi)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of unencrypted / Public WiFi&lt;br /&gt;
&lt;br /&gt;
* Understanding and using of WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Internet Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of the Internet and routed networks. This includes understanding how connections to cloud services are established and understanding common threats against services on the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of botnets&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of clouds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of a VPN provider&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of gateway packet filters&lt;br /&gt;
&lt;br /&gt;
* Awareness of TOR and the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi factor authentication as well as being aware of common threats against individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager (keepass2)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks of traditional password memorization compared to password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing&lt;br /&gt;
&lt;br /&gt;
* Understanding of Social Engineering&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Trustworthiness (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to judge the trustworthiness and correctness of information on the internet. This includes understanding how search engines work and rank their results, knowing common criteria for recognizing fake news, spam messages and scam.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of search engines and web index&lt;br /&gt;
&lt;br /&gt;
* Awareness of web archives&lt;br /&gt;
&lt;br /&gt;
* Recognition of fake news&lt;br /&gt;
&lt;br /&gt;
* Distinguishing fake and real URLs&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various services as well as being aware of common threats against personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering and profiling&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of identity theft&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of stalking&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cybermobbing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of doxxing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of fake profiles&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cookies and tracking&lt;br /&gt;
&lt;br /&gt;
* Configuring profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Managing contacts and privacy settings on social networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about own personal information (such as GDPR for companies based in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mmarco</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5319</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5319"/>
		<updated>2019-05-28T14:13:40Z</updated>

		<summary type="html">&lt;p&gt;Mmarco: /* The Minimally Qualified Candidate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The Candidate has a basic understanding of the major security threats of using computers, networks, connected devices and IT service on premise and in the cloud. The candidate understands common ways to prevent, mitigate and prevent attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on local storage media and in the cloud. The candidate is able to apply common security tools, protect private information and secure their identity. The candidate is able to take responsibility for securing their own devices and making use of IT services.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals (confidentiality, integrity and availability, non repudiation)&lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security (hackers, crackers, black hat, white hat)&lt;br /&gt;
&lt;br /&gt;
* Awareness of industrial espionage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behaviour (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidates should understand the implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications of one’s actions on others&lt;br /&gt;
&lt;br /&gt;
* Handling of personal and confidential information in a responsible way&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore candidates should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of hash functions&lt;br /&gt;
&lt;br /&gt;
* Awareness of most important cryptographic algorithms &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how certificates are associated with a subject and an issuer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSL Labs Server Test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of GPG for email encryption. This includes handling one’s own and foreign GPG keys and sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of GPG&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of key servers&lt;br /&gt;
&lt;br /&gt;
* Using GPG for Email encryption (using Enigmail and Thunderbird on Windows, Linux or OS X)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of data, file and storage device be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in a container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in the cloud &lt;br /&gt;
&lt;br /&gt;
* Awareness of Bitlocker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of USB devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of Bluetooth devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of RFID devices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local packet filters, endpoint firewalls and application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of malware (virus, ransomware, trojan horses, adware, cryptominers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of spying (file copy, keylogging, camera and microphone hijacking)&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of data and address books copies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of keyloggers&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of data access and sharing in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups (full, differential, incremental backups, backup retention)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Local Network Access Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how devices are connected to a local network and and which threats result from physical media access. Furthermore, candidates should be able to securely connect to a wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP networks and the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP addresses and ports&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind routing and network providers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media (wired and WiFi)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of unencrypted / Public WiFi&lt;br /&gt;
&lt;br /&gt;
* Understanding and using of WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Internet Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of the Internet and routed networks. This includes understanding how connections to cloud services are established and understanding common threats against services on the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of botnets&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of clouds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of a VPN provider&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of gateway packet filters&lt;br /&gt;
&lt;br /&gt;
* Awareness of TOR and the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi factor authentication as well as being aware of common threats against individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager (keepass2)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks of traditional password memorization compared to password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing&lt;br /&gt;
&lt;br /&gt;
* Understanding of Social Engineering&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Trustworthiness (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to judge the trustworthiness and correctness of information on the internet. This includes understanding how search engines work and rank their results, knowing common criteria for recognizing fake news, spam messages and scam.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of search engines and web index&lt;br /&gt;
&lt;br /&gt;
* Awareness of web archives&lt;br /&gt;
&lt;br /&gt;
* Recognition of fake news&lt;br /&gt;
&lt;br /&gt;
* Distinguishing fake and real URLs&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various services as well as being aware of common threats against personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering and profiling&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of identity theft&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of stalking&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cybermobbing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of doxxing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of fake profiles&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cookies and tracking&lt;br /&gt;
&lt;br /&gt;
* Configuring profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Managing contacts and privacy settings on social networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about own personal information (such as GDPR for companies based in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mmarco</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5318</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5318"/>
		<updated>2019-05-28T13:32:31Z</updated>

		<summary type="html">&lt;p&gt;Mmarco: Created page with &amp;quot;__FORCETOC__ ==Introduction==  This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general u...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The Candidate has a basic understanding of the major security threats of using computers, networks, connected devices and IT service on premise and in the cloud. The candidate understands common ways to prevent, mitigate and prevent attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on local storage media and in the cloud. The candidate is able to apply common security tools, protect private information and secure their identity. The candidate is able to take responsibility for securing their own devices and making use of IT services.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals (confidentiality, integrity and availability, non repudiation)&lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security (hackers, crackers, black hat, white hat)&lt;br /&gt;
&lt;br /&gt;
* Awareness of industrial espionage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behaviour (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidates should understand the implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications of one’s actions on others&lt;br /&gt;
&lt;br /&gt;
* Handling of personal and confidential information in a responsible way&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore candidates should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of hash functions&lt;br /&gt;
&lt;br /&gt;
* Awareness of most important cryptographic algorithms &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how certificates are associated with a subject and an issuer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSL Labs Server Test&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of GPG for email encryption. This includes handling one’s own and foreign GPG keys and sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of GPG&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of key servers&lt;br /&gt;
&lt;br /&gt;
* Using GPG for Email encryption (using Enigmail and Thunderbird on Windows, Linux or OS X)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of data, file and storage device be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in a container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in the cloud &lt;br /&gt;
&lt;br /&gt;
* Awareness of Bitlocker&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the functionality of tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of USB devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of Bluetooth devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of security implications of RFID devices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local packet filters, endpoint firewalls and application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of malware (virus, ransomware, trojan horses, adware, cryptominers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of various types of spying (file copy, keylogging, camera and microphone hijacking)&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of data and address books copies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of keyloggers&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of data access and sharing in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups (full, differential, incremental backups, backup retention)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Local Network Access Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how devices are connected to a local network and and which threats result from physical media access. Furthermore, candidates should be able to securely connect to a wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP networks and the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind IP addresses and ports&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles behind routing and network providers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media (wired and WiFi)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of unencrypted / Public WiFi&lt;br /&gt;
&lt;br /&gt;
* Understanding and using of WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Internet Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of the Internet and routed networks. This includes understanding how connections to cloud services are established and understanding common threats against services on the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of the internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of botnets&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of clouds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of a VPN provider&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of gateway packet filters&lt;br /&gt;
&lt;br /&gt;
* Awareness of TOR and the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi factor authentication as well as being aware of common threats against individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager (keepass2)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks of traditional password memorization compared to password managers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing&lt;br /&gt;
&lt;br /&gt;
* Understanding of Social Engineering&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Trustworthiness (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to judge the trustworthiness and correctness of information on the internet. This includes understanding how search engines work and rank their results, knowing common criteria for recognizing fake news, spam messages and scam.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of search engines and web index&lt;br /&gt;
&lt;br /&gt;
* Awareness of web archives&lt;br /&gt;
&lt;br /&gt;
* Recognition of fake news&lt;br /&gt;
&lt;br /&gt;
* Distinguishing fake and real URLs&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various services as well as being aware of common threats against personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering and profiling&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of identity theft&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of stalking&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cybermobbing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of doxxing&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of fake profiles&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cookies and tracking&lt;br /&gt;
&lt;br /&gt;
* Configuring profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Managing contacts and privacy settings on social networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about own personal information (such as GDPR for companies based in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mmarco</name></author>
	</entry>
</feed>