CNT-Guide
- Math Numbering
- 1.0 - Systems & Conversions (e.g., binary, decimal, hex)
- Computer Concepts
- 2.0 - CPU architectures, endianness, virtualization
- Memory Organization and Layout
- 3.0 - Offsets and Lengths
- Storage Concepts
- 4.0 - Hard Disk Drive, Solid State Drive
- Kernel vs User Space
- 5.0 - Differences Between Windows and Linux
- Networking Basics
- 6.0 - IP / Subnetting
- 6.1 - Ethernet
- 6.2 - Routing
- 6.3 - Lower Level Protocols & Standards and How They Integrate with One Another
- 6.4 - Layout & Design (Network Topology, LAN/WAN)
- 6.5 - How a Packet Transits a Network and How the Packet is Modified as It Transits a Network (OSI Model Layer 2-4)
- 6.6 - Concept of Open and Closed Ports Including Associated Flags
- 6.7 - TCP/IP 3 Way Handshake
- 6.8 - Networking Device Concepts (e.g., Switches, Routers, Firewalls, IDS, VLAN)
- Network Services
- 7.0 - Description, Protocols, and Ports for Standard Network Services (e.g., FTP, DNS, DHCP, ARP, SSH, HTTP, Telnet, Kerberos)
- 7.1 - Network Services and Ports on a Standard Window/Unix Install (e.g., RPC, NetBIOS, NFS, Kerberos)
- 7.2 - Interpreting the Output from Network Related Commands (e.g., netstat, ip/ifconfig, route, iptables)
- 7.3 - Network Service Administration and Configuration
- 7.4 - Encryption Fundamentals (e.g., Public/Private Key, Asymmetric Encryption, Symmetric Encryption)
- System Administration
- 8.0 - Understanding of Standard Administrative Commands and Their Output (e.g., ps, tasklist, netstat, ifconfig, ipconfig)
- 8.1 - Local System Configurations (ifconfig, Host File, Logging)
- 8.2 - Data Security & Integrity Concepts (e.g., Hashing, Encryption)
- 8.3 - Antivirus Concepts: Signature vs. Heuristics
- 8.4 - Data Integrity Protection Concepts (e.g., Tripwire, Windows File Protection)
- 8.5 - Knowledge of Different Shells (e.g., cmd, bash, wmic)
- 8.6 - Shell Usage (e.g., I/O, Process Control, Variables, Operators, Substitution, Shell Expansion)
- 8.7 - Researching Commands and Command Syntax
- 8.8 - Hard Drive Partitioning and Layout (File System Basics)
- 8.9 - Navigating the Unix File System via Command Line (e.g., File Modification, Output Redirect)
- 8.10 - Navigating the Windows File System via Command Line (e.g., File Modification, Output Redirect)
- 8.11 - Basic Knowledge of Windows Registry Organization and Structure
- 8.12 - Creating and Changing Registry Values via Command Line or GUI
- 8.13 - Basic Knowledge of Software/Code Signing
- 8.14 - Understanding of Device Drivers
- 8.15 - Understanding Unix, Linux, and Windows Services and Configuration Locations
- 8.16 - Knowledge of Executable File Types & Extensions on Windows and Unix
- Scripting and Programming
- Malware and Security
- 10.0 - Classes of Malware and Their Key Features or Abilities
- 10.1 - Noise Signatures from Various Malware and Their Impact on Remote Operation
- 10.2 - Identification of Malicious Programs on Remote Hosts
- 10.3 - Observable Fingerprints of Malware
- 10.4 - Types of Rootkits, Methods of Infection, Privilege Levels, and Detection Methods
- 10.5 - Built-In Security Mechanisms for Both UNIX and Windows Operating Systems
- 10.6 - Capabilities and Use of Security Products
- 10.7 - Network Monitoring Applications and Products
- 10.8 - Network Vulnerabilities