Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) and exploitation techniques
Web security knowledge (e.g. web protocols, authentication and session management mechanisms)
Knowledge of the basics of network security (e.g., encryption, firewalls, proxies, authentication, honey pots, perimeter protection)
Knowledge of authentication, authorization, and access control methods
Knowledge of cyber defence and vulnerability assessment tools and their capabilities
Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
Knowledge of incident response and handling methodologies
Knowledge of cybersecurity and privacy principles
Skill in collecting data from a variety of cyber defence resources
Skill in using incident handling methodologies
Skill in recognising and categorizing types of vulnerabilities and associated attacks
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
offered :
Access to best-in-class security training platform
Eligibility for security certification on a regular basis