What do information security engineers eat in the morning?

Information security engineer belongs to the intermediate qualification examination of soft test. In the morning, the information security engineer of the soft test takes the basic knowledge subject, and the test questions are objective multiple-choice questions, with a full score of 75. The exam will be scheduled at 9: 00 am-11:30 am.

The subjects of the morning exam for intermediate information security engineers in soft exam are basic knowledge, and the exam time is arranged at 9:00- 1 1:30 in the morning. The examination scope is as follows:

1. information security basics

1. 1 information security concept

1.2 information security laws and regulations

China's legislative and judicial status

Computer and network security laws and regulations.

1.3 information security management foundation

1.3. 1 information security management system and policy

1.3.2 information security risk assessment and management

1.4 information security standardization knowledge

1.4. 1 Familiar with the basic knowledge of information security technical standards.

1.4.2 Understanding ISO

1.4.3 information security series standard

1.5 Information Security English

2. Basic knowledge of computer network

2. 1 computer network architecture

2.2 Internet Protocol

2.2. 1 network layer protocol

2.2.2 Transport layer protocol

2.2.3 Application layer protocol

3. Password system

3. 1 Basic concepts of cryptography

3. 1. 1 Cryptography Definition

3. 1.2 Cryptosystem

3. 1.3 classic password

3.2 Block cipher

3.2. 1 the concept of block cipher

2 DES

Adverse event

3.2.4 SM4

3.2.5 Block cipher working mode

3.3 sequence cipher

3.3. The concept of1sequence cipher

3.3.2 Linear shift register sequence

RC4

ZUC

3.4 Hash function

3.4. The concept of1hash function

SHA algorithm

SM3 algorithm

HMAC

3.5 Public Key Cryptosystem

3.5. 1 The concept of public key encryption

RSA password

3.5.3 ElGamal password

Elliptic curve cipher

3.5.5 SM2 elliptic curve public key encryption algorithm

3.6 Digital signature

3.6. 1 the concept of digital signature

3.6.2 Typical Digital Signature System

3.6.3 SM2 Elliptic Curve Digital Signature Algorithm

3.7 certification

3.7. 1 certification concept

3.7.2 Identity authentication

3.7.3 Message authentication

3.8 Key Management

The concept of key management

3.8.2 Key management of symmetric encryption

3.8.3 Key Management of Asymmetric Encryption

4. Network security

4. 1 Basic concept of network security

4.2 Network security threats

4.2. 1 threat source and type

4.2.2 Website security threats

4.2.3 Wireless network security threats

4.3 Network security defense

4.3. 1 network security defense principles

Basic defense technology

safety protocol

4.4 Wireless Network Security

4.4. 1 Basic knowledge of wireless network

4.4.2 Wireless Network Security Threats and Analysis

4.4.3 Security Mechanism of Wireless Network

5. Computer security

5. 1 computer equipment safety

5. 1. 1 Definition of computer security

5. 1.2 computer system security model and security method

5. 1.3 electromagnetic leakage and interference

5. 1.4 physical safety

5. 1.5 computer reliability technology

5.2 Operating System Security

5.2. 1 Basic knowledge of operating system security

5.2.2 Security threats faced by the operating system

Security model

5.2.4 Operating System Security Mechanism

5.2.5 Implementation method of operating system security enhancement

5.3 Security of database system

5.3. 1 database security concept

5.3.2 Development course of database security

5.3.3 Database Access Control Technology

Database encryption

Multilevel security database

5.3.6 Reasoning control of database

Backup and recovery of database

5.4 malicious code

Definition and classification of malicious code

5.4.2 Naming Rules for Malicious Codes

5.4.3 Computer virus

Network worm

5.4.5 Trojan horse

back door

5.4.7 Other malicious codes

5.4.8 Methods of Clearing Malicious Codes

5.4.9 Typical anti-virus technology

5.5 Computer forensics

Basic concepts of computer forensics

5.5.2 Electronic evidence and its characteristics

5.5.3 Computer forensics technology

5.6 Embedded System Security

5.6. 1 Smart card security basics

USB key technology

5.6.3 Mobile intelligent terminal

5.6.4 Familiar with the safety problems and solutions of industrial control system.

5.7 Cloud computing security

5.7. 1 Cloud computing security foundation

5.7.2 IaaS layer security technology

5.7.3 PaaS layer security technology

SaaS layer security technology

6. Application system security

6. 1 network security

6. 1. 1 network security threats

6. 1.2 network security threat protection technology

6.2 e-commerce security

6.2. 1 Basic knowledge of e-commerce security

6.2.2 E-commerce security certification system

6.2.3 E-commerce Security Service Agreement

6.3 information hiding

6.3. 1 Basic knowledge of information hiding

6.3.2 Digital watermarking technology

6.4 Network public opinion

6.4. 1 Basic concept of online public opinion?

6.4.2 Basic Technology of Internet Public Opinion

6.5 Privacy protection

6.5. 1 Basic knowledge of privacy protection

6.5.2 Data Mining and Privacy Protection

6.5.3 Privacy Measurement and Evaluation Standards

Tips: Due to the constant change and adjustment of examination policies and contents, the above information provided by Hunting Examination Network is for reference only. If you have any objection, please refer to the contents published by the authoritative department!

The following are the free review materials: 2022 Information System Management Engineer Learning Plan.

Format: PDF Size: 229.46 KB Software Designer Learning Plan for the first half of 2008.

Format: DO size: 2028. 1KB

If you have questions about the qualification examination, don't know how to summarize the contents of the test center, and don't know the local registration policy, click on the bottom to consult the hunting test network and get the review materials for free.