The CyberStars Competition will test participants across a wide range of cyber security competences. Specifically, the competition will test candidates across a number of learning objectives. Learning objectives fall into the following main categories:

  • K = Knowledge, assessed through theoretical questions
  • C = Competence, assessed through practical questions

The following tables summarize the learning objective domains and the assessment method for each learning objective.

Ethical Hacking

1 LO 1 Ethical Hacking Methodology
2         LO 1.1 Explain the Ethical Hacking Methodology x
3         LO 1.2 Identify examples of unethical conducts with regards to Ethical Hacking x
4 LO 2 Footprinting and Reconnaissance
5         LO 2.1 Explain the Footprinting and Reconnaissance phase and identify relevant activities and tools x
6         LO 2.2 Select and use appropriate open-source tools to perform footprinting and reconnaissance activities x
7         LO 2.3 Correctly interpret the results from WHOIS queries x
8         LO 2.4 Correctly interpret the results from DNS interrogation tools x
9         LO 2.5 Perform Open-source intelligence (OSINT) using Web search engines and open-source tools x
10 LO 3 Scanning Networks, Systems

Intrusion Detection and Security Monitoring


1 LO 1 TCP/IP Protocols
2         LO 1.1 List and describe Common networking protocols (e.g. DHCP, ARP, TCP,UDP, IP, ICMP, IPsec) x
3         LO 1.2 List and describe Common application protocols (e.g. HTTP, SMTP, FTP, DNS) x
4         LO 1.3 Describe the IP fragmentation process and the IP header fields used x
5 LO 2 Cyber Threats and Attacks
6         LO 2.1 List and describe common types of malware x
7         LO 2.2 List and describe common network and systems attack patterns x
8         LO 2.3 List and describe different types of covert channels x
9 LO 3 Network traffic and protocol analysis x
10         LO 3.1 List and describe bets practice tools to carry out network and protocol analysis x


Computer Forensics

1 LO 1 Computer Forensics Methodology
2         LO 1.1 List and describe the different characteristics of digital evidence x
3         LO 1.2 List and describe different types of computer forensics evidence x
4         LO 1.3 Describe the evidence collection and management process including the chain of custody x
6         LO 1.4 Describe the Role of a computer forensics investigator x
7         LO 1.5 List and describe Legal and regulatory requirements that apply to apply a computer forensics investigation x
8 LO 2 Incident Response
10         LO 2.1 List and describe the best practice activities of the incident management process x
11         LO 2.2 Describe the difference between a dead and a live system x
12         LO 2.3 Explain the Lochard principle x