mod 1 Flashcards
Replicates real threats to understand how they operate and neutralizes them
Adaptive threat replication engineer
A security team responsible for maintaining overall system security, preventing security breaches, monitoring potential threats, and researching security technology; typically responsible for finding and implementing security controls to strengthen the CIA triad
Blue team
Proof of technical knowledge backed by an industry-standard provider such as Microsoft or CompTIA
Certification
The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
Cybersecurity
Keeps computer information systems secure and controls access to systems based on user classifications
Cybersecurity engineer
Website that provides details on cybersecurity-related positions in the US job market
Cyberseek
Researches and evaluates security threats and products; recommends improvements to organizational cyber defense
Defensive cybersecurity analyst
Gathers digital information evidence and trails in the systems to determine how cybercrimes were committed
Digital forensic investigator
Hired by organizations to legally hack into their networks and identify weak entry points
Ethical hacker
Replicates real threats to understand how they operate and how to neutralize them
Incident detection engineer
Assesses technology for potential security, efficiency, and compliance issues
IT auditor
Responsible for the management and monitoring of organizational network security
Network security administrator
An organizational security team responsible for providing security assessments outlining an organization’s system defense efficacy and resilience; uses penetration testing tools to search for weaknesses and vulnerabilities
Red team
Monitors and manages networks; works with intrusion detection/prevention systems
Security operations center (SOC) analyst
Hunts for critical flaws and vulnerabilities in networks, often as a third-party consultant
Vulnerability assessment analyst