CYSCB1 | Communicate effectively for a range of purposes and audiences |
CYSCB2 | Describe the breadth of the information security field and its impact on business |
CYSCB3 | Employ firewalls, VPNs, and stateful packet inspection techniques to harden networks. |
CYSCB4 | Identify and analyze, determine impacts, and develop plans to mitigate security risks. |
CYSCB5 | Identify and correct programming and software architecture mistakes that lead to application security vulnerabilities |
CYSCB6 | Identify, acquire, analyze, and report on evidence gathered from cyber intrusions and incidents using appropriate legal and ethical procedures |
CYSCB7 | Develop a consistent and strategic balance among business needs, security policy, industry and regulatory standards, and technology for overall information security architecture |
CYSCB8 | Be prepared to compete successfully in securing employment or progressing in their chosen field. |