wwkly assessment index.pdf
Document Details
Uploaded by Deleted User
Full Transcript
INDEX SL NO TOPIC I] Who are Hackers? Explain the types of Hackers? II] Explain the types of Data? 1 III] What is Defense in Depth? Explain its need? IV] Explain McCumber’s Cube with a neat diagram I] Discuss the...
INDEX SL NO TOPIC I] Who are Hackers? Explain the types of Hackers? II] Explain the types of Data? 1 III] What is Defense in Depth? Explain its need? IV] Explain McCumber’s Cube with a neat diagram I] Discuss the digital signature and RSA algorithm with an example II] Discuss AES Algorithm and Message Authentic Code 2 III] Discuss Caesar Cipher algorithm with example IV] Discuss about Birthday Attack and Hash Function V] Find GCD[108, 144], [210,360] I] Discuss about Firewall, IDS, IPS, VPN 3 II] Discuss about Injection Attack, Http Headers III] Discuss about DOS attacks and counter measures I] Discuss about Window Security Infrastructure II] Discuss about Linux Vulnerabilites 4 III] Discuss about Kernel IV] Discuss about Log I] What is Threat Modelling? List uses of Threat Modelling 5 II] Discuss about STRIDE, PASTA, OCTAVE III] Explain change management and its changes I] Steps for Installation of WebGoat 6 II] Discuss about SAST, DAST, IAST I] Discuss the services provided by cloud II] Discuss about shared responsibility model 7 III] Discuss about IAM in cloud IV] What are the key metrices in cloud I] Discuss about Portswigger 8 II] Discuss about Nmap III] Solve and Document tasks from Attacker Side and Defender Side on cloud flaws I] Discuss about Apple IOS features 9 II] Discuss the security and privacy features of Apple IOS III] Discuss some scenarios where unintended data leakage flaws may exist I] Give 2 KRI’s for Patch management and Antivirus management II] Discuss the stages and life cycle of Incident Management 10 III] Discuss best practices in Incident Management IV]Discuss Data analysis tool I] What is GRC? Discuss important policies, procedures, process in GRC 11 II] Discuss about patch management, vulnerability management and enterprise management 12 Presentation on cybersecurity and best practices