Overview |
- Candidates understand major attack methods that lead to system outage, information theft, leaks, and tampering.
- Candidates can diagnose and prevent issues across network, application, platform, and data layers.
|
Details |
- Understand the principles behind typical attack techniques, especially those that harm the system side.
- Various DoS/DDoS attack methods: Reflection attack, SYN flood, open resolver
- Applications used in DoS/DDoS: Memcached, NTP, DNS
- Unauthorized access methods: SQL and OS command injection, directory traversal, buffer overflow, credential stuffing
- Configure, execute, interpret detection results, and respond to vulnerability assessment tools. Manage vulnerabilities by deciding whether, when, and how often to fix them.
- Conduct penetration testing: GVM, ZAP
- Detect vulnerable packages (patches): Clair, Katello, Vuls
- Ensure compliance with standards: OpenSCAP
- Scan container images: Trivy
- Implement designs that allow only legitimate communications and access to prevent threats.
- WAF, DMZ, UTM
- Packet signature-based filtering, DPI
- Certificate-based authentication
- Prepare mitigation strategies against attacks and information leaks.
- DDoS Mitigation Device, ISP Blackhole Routing
- Rate limiting
- Sandboxing
- Encrypted file systems and storage: LUKS, dm-crypt, TPM
- Restrict access to external ports/devices (e.g., USB port restriction)
- Remove unused functions and settings to reduce potential vulnerabilities.
- Delete unnecessary users and access rights
- Detect unused services and software
- Configure permissions and resource settings for virtual machines/containers
|