Basic Cybersecurity Skills
Please rank the following based on how important you believe it is for an entry-level IT worker to have the following skills and abilities on the job.
Sign in to Google to save your progress. Learn more
ITCC.2441.1 Develop a security plan
Not very
Very much
Clear selection
ITCC.2441.2 Establish suitable level of protection
Not very
Very much
Clear selection
ITCC.2441.3 Determine legal issues
Not very
Very much
Clear selection
ITCC.2441.4 Implement network security design
Not very
Very much
Clear selection
ITCC.2441.5 Revise risk analysis and security plan
Not very
Very much
Clear selection
ITSY.1400.1 Outline best practices for the information security goals of confidentiality, integrity and availability
Not very
Very much
Clear selection
ITSY.1400.2 Explain ethical practices in information security
Not very
Very much
Clear selection
ITSY.1400.3 Define vocabulary/terminology related to information security.
Not very
Very much
Clear selection
ITSY.1400.4 Explain the importance of planning and administrative controls in information security
Not very
Very much
Clear selection
ITSY.1400.5 Identify security threats, vulnerabilities, and countermeasures
Not very
Very much
Clear selection
ITSY.1400.6 Identify procedures for security risk management
Not very
Very much
Clear selection
ITSY.1442.1 Apply National Institute of Standards and Technology (NIST) Guidelines and other best practices
Not very
Very much
Clear selection
ITSY.1442.2 Develop backup/recovery procedures to provide for data security
Not very
Very much
Clear selection
ITSY.1442.3 Use network operating system features to implement network security
Not very
Very much
Clear selection
ITSY.1442.4 Identify computer and network threats and vulnerabilities and methods to prevent their effects
Not very
Very much
Clear selection
ITSY.1442.5 Use tools to enhance network security
Not very
Very much
Clear selection
ITSY.1442.6 Use encryption techniques to protect network data
Not very
Very much
Clear selection
ITSY.2400.1 Identify network security risks, security design, and monitoring solutions
Not very
Very much
Clear selection
ITSY.2400.2 Identify sources of computer threats, evaluate potential practices, tools, and technologies to protect individual network systems
Not very
Very much
Clear selection
ITSY.2400.3 Establish and sustain an operating system security plan utilizing systems and application security tools
Not very
Very much
Clear selection
ITSY.2400.4 Implement procedures to secure and monitor audit logs and set system administrator alerts
Not very
Very much
Clear selection
ITSY.2400.5 Develop an organizational operating system security plan that provides for periodic reviews of security policies, procedures, authorized users list, and software update patches
Not very
Very much
Clear selection
ITSY.2401.1 Demonstrate system security skills through firewall implementation and testing
Not very
Very much
Clear selection
ITSY.2401.2 Use system tools, practices, and relevant technologies to implement a security plan
Not very
Very much
Clear selection
ITSY.2401.3 Evaluate practices, tools, and technologies to identify security breaches, sources of attacks, and protect mission critical systems
Not very
Very much
Clear selection
ITSY.2401.4 Establish an appropriate level of security based on an analysis of security logs
Not very
Very much
Clear selection
ITSY.2401.5 Use relevant tools to secure a network, respond to and follow up on various types of attacks.
Not very
Very much
Clear selection
ITSY.2441.1 Develop a security plan
Not very
Very much
Clear selection
ITSY.2441.2 Establish suitable level of protection while managing IT security systems
Not very
Very much
Clear selection
ITSY.2441.3 Determine legal issues while managing IT security systems
Not very
Very much
Clear selection
ITSY.2441.4 Implement network security design
Not very
Very much
Clear selection
ITSY.2441.5 Revise risk analysis and security plans
Not very
Very much
Clear selection
ITSY.2442.1 Identify sources of security attacks
Not very
Very much
Clear selection
ITSY.2442.2 Restore a system to normal operation
Not very
Very much
Clear selection
ITSY.2442.3 Identify and prevent security threats
Not very
Very much
Clear selection
ITSY.2442.4 Perform a postmortem analysis
Not very
Very much
Clear selection
ITSY.2442.5 Identify computer investigation issues
Not very
Very much
Clear selection
ITSY.2442.6 Identify the roles and responsibility of the incident response team
Not very
Very much
Clear selection
ITSY.2443.1 Identify computer investigation issues
Not very
Very much
Clear selection
ITSY.2443.2 Identify legal issues associated with computer investigations
Not very
Very much
Clear selection
ITSY.2443.3 Collect document evidence and evaluate evidence
Not very
Very much
Clear selection
ITSY.2443.4 Evaluate network traffic
Not very
Very much
Clear selection
ITSY.2445.1 Assemble network defense tools
Not very
Very much
Clear selection
ITSY.2445.2 Differentiate between authorized and unauthorized activity on a network
Not very
Very much
Clear selection
ITSY.2445.3 Respond to a breach in security through the use of countermeasures designed to minimize the impact of the breach on the network
Not very
Very much
Clear selection
ITSY.2445.4 Document network events.
Not very
Very much
Clear selection
ITSY.2445.5 Present an analysis of network breach and plan for remediation
Not very
Very much
Clear selection
ITSY.2459.1 Appraise security plan to ensure appropriate level of protection
Not very
Very much
Clear selection
ITSY.2459.2 Assess network security design
Not very
Very much
Clear selection
ITSY.2459.3 Audit network system based on security design
Not very
Very much
Clear selection
ITSY.2459.4 Use relevant tools to assure security requirements
Not very
Very much
Clear selection
ITSY.2459.5 Review security policies and procedures on a regular basis
Not very
Very much
Clear selection
Submit
Clear form
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy