CNT-Guide

  1. Math Numbering
    • 1.0 - Systems & Conversions (e.g., binary, decimal, hex)
  2. Computer Concepts
    • 2.0 - CPU architectures, endianness, virtualization
  3. Memory Organization and Layout
    • 3.0 - Offsets and Lengths
  4. Storage Concepts
    • 4.0 - Hard Disk Drive, Solid State Drive
  5. Kernel vs User Space
    • 5.0 - Differences Between Windows and Linux
  6. Networking Basics
    • 6.0 - IP / Subnetting
    • 6.1 - Ethernet
    • 6.2 - Routing
    • 6.3 - Lower Level Protocols & Standards and How They Integrate with One Another
    • 6.4 - Layout & Design (Network Topology, LAN/WAN)
    • 6.5 - How a Packet Transits a Network and How the Packet is Modified as It Transits a Network (OSI Model Layer 2-4)
    • 6.6 - Concept of Open and Closed Ports Including Associated Flags
    • 6.7 - TCP/IP 3 Way Handshake
    • 6.8 - Networking Device Concepts (e.g., Switches, Routers, Firewalls, IDS, VLAN)
  7. Network Services
    • 7.0 - Description, Protocols, and Ports for Standard Network Services (e.g., FTP, DNS, DHCP, ARP, SSH, HTTP, Telnet, Kerberos)
    • 7.1 - Network Services and Ports on a Standard Window/Unix Install (e.g., RPC, NetBIOS, NFS, Kerberos)
    • 7.2 - Interpreting the Output from Network Related Commands (e.g., netstat, ip/ifconfig, route, iptables)
    • 7.3 - Network Service Administration and Configuration
    • 7.4 - Encryption Fundamentals (e.g., Public/Private Key, Asymmetric Encryption, Symmetric Encryption)
  8. System Administration
    • 8.0 - Understanding of Standard Administrative Commands and Their Output (e.g., ps, tasklist, netstat, ifconfig, ipconfig)
    • 8.1 - Local System Configurations (ifconfig, Host File, Logging)
    • 8.2 - Data Security & Integrity Concepts (e.g., Hashing, Encryption)
    • 8.3 - Antivirus Concepts: Signature vs. Heuristics
    • 8.4 - Data Integrity Protection Concepts (e.g., Tripwire, Windows File Protection)
    • 8.5 - Knowledge of Different Shells (e.g., cmd, bash, wmic)
    • 8.6 - Shell Usage (e.g., I/O, Process Control, Variables, Operators, Substitution, Shell Expansion)
    • 8.7 - Researching Commands and Command Syntax
    • 8.8 - Hard Drive Partitioning and Layout (File System Basics)
    • 8.9 - Navigating the Unix File System via Command Line (e.g., File Modification, Output Redirect)
    • 8.10 - Navigating the Windows File System via Command Line (e.g., File Modification, Output Redirect)
    • 8.11 - Basic Knowledge of Windows Registry Organization and Structure
    • 8.12 - Creating and Changing Registry Values via Command Line or GUI
    • 8.13 - Basic Knowledge of Software/Code Signing
    • 8.14 - Understanding of Device Drivers
    • 8.15 - Understanding Unix, Linux, and Windows Services and Configuration Locations
    • 8.16 - Knowledge of Executable File Types & Extensions on Windows and Unix
  9. Scripting and Programming
    • 9.0 - Basic Knowledge of Shell Scripting (e.g., cmd, wmic, bash)
    • 9.1 - Basic Knowledge of Interpreted Languages (e.g., PERL, Python)
    • 9.2 - Interpreting Source Code and Scripts (e.g., Flow, Variables, Loops)
  10. Malware and Security
    • 10.0 - Classes of Malware and Their Key Features or Abilities
    • 10.1 - Noise Signatures from Various Malware and Their Impact on Remote Operation
    • 10.2 - Identification of Malicious Programs on Remote Hosts
    • 10.3 - Observable Fingerprints of Malware
    • 10.4 - Types of Rootkits, Methods of Infection, Privilege Levels, and Detection Methods
    • 10.5 - Built-In Security Mechanisms for Both UNIX and Windows Operating Systems
    • 10.6 - Capabilities and Use of Security Products
    • 10.7 - Network Monitoring Applications and Products
    • 10.8 - Network Vulnerabilities