The CyberStars Competition will test participants across a wide range of cyber security competences. Specifically, the competition will test candidates across a number of learning objectives. Learning objectives fall into the following main categories:
- K = Knowledge, assessed through theoretical questions
- C = Competence, assessed through practical questions
The following tables summarize the learning objective domains and the assessment method for each learning objective.
Ethical Hacking
wdt_ID | LEARNING OBJECTIVE | K | C |
---|---|---|---|
1 | LO 1 Ethical Hacking Methodology | ||
2 | LO 1.1 Explain the Ethical Hacking Methodology | x | |
3 | LO 1.2 Identify examples of unethical conducts with regards to Ethical Hacking | x | |
4 | LO 2 Footprinting and Reconnaissance | ||
5 | LO 2.1 Explain the Footprinting and Reconnaissance phase and identify relevant activities and tools | x | |
6 | LO 2.2 Select and use appropriate open-source tools to perform footprinting and reconnaissance activities | x | |
7 | LO 2.3 Correctly interpret the results from WHOIS queries | x | |
8 | LO 2.4 Correctly interpret the results from DNS interrogation tools | x | |
9 | LO 2.5 Perform Open-source intelligence (OSINT) using Web search engines and open-source tools | x | |
10 | LO 3 Scanning Networks, Systems |
Intrusion Detection and Security Monitoring
wdt_ID | LEARNING OBJECTIVE | K | C |
---|---|---|---|
1 | LO 1 TCP/IP Protocols | ||
2 | LO 1.1 List and describe Common networking protocols (e.g. DHCP, ARP, TCP,UDP, IP, ICMP, IPsec) | x | |
3 | LO 1.2 List and describe Common application protocols (e.g. HTTP, SMTP, FTP, DNS) | x | |
4 | LO 1.3 Describe the IP fragmentation process and the IP header fields used | x | |
5 | LO 2 Cyber Threats and Attacks | ||
6 | LO 2.1 List and describe common types of malware | x | |
7 | LO 2.2 List and describe common network and systems attack patterns | x | |
8 | LO 2.3 List and describe different types of covert channels | x | |
9 | LO 3 Network traffic and protocol analysis | x | |
10 | LO 3.1 List and describe bets practice tools to carry out network and protocol analysis | x |
Computer Forensics
wdt_ID | LEARNING OBJECTIVE | K | C |
---|---|---|---|
1 | LO 1 Computer Forensics Methodology | ||
2 | LO 1.1 List and describe the different characteristics of digital evidence | x | |
3 | LO 1.2 List and describe different types of computer forensics evidence | x | |
4 | LO 1.3 Describe the evidence collection and management process including the chain of custody | x | |
6 | LO 1.4 Describe the Role of a computer forensics investigator | x | |
7 | LO 1.5 List and describe Legal and regulatory requirements that apply to apply a computer forensics investigation | x | |
8 | LO 2 Incident Response | ||
10 | LO 2.1 List and describe the best practice activities of the incident management process | x | |
11 | LO 2.2 Describe the difference between a dead and a live system | x | |
12 | LO 2.3 Explain the Lochard principle | x |