What application technology does the information security engineer take?

Information security engineer belongs to the intermediate qualification examination of soft test. The examination time of information security engineer's applied technology subject is arranged in the afternoon, and the examination topic is subjective, with a score of 75, and the qualification standard is basically stable at 45.

The application technology subject of intermediate information security engineer in soft exam is arranged for the afternoon exam. According to the information security engineer examination outline, the scope of the afternoon subject examination is as follows:

1. Cryptographic application;

1. 1 implementation of cryptographic algorithm;

Application of 1.2 cryptographic algorithm;

The application of the typical cryptographic algorithm of 1.2. 1;

1.2.2 block cipher working mode;

1.2.3 application of public key cryptography;

Application of 1.3 typical authentication protocol;

1.3. 1 certification;

1.3.2 Application of typical authentication protocol;

1.4 key management technology;

2. Network security engineering;

2. 1 network security requirements analysis and basic design;

2.2 Configuration and use of network security products;

2.2. 1 network traffic monitoring and protocol analysis;

2.2.2 Configuration and use of gateway;

2.2.3 Configuration and use of firewall;

2.2.4 Configuration and use of intrusion detection system;

2.3 Implement network security risk assessment;

2.3. 1 Basic principle and process;

2.3.2 Work in the appraisal stage;

2.3.3 Work in the risk analysis stage;

2.3.4 Risk disposal;

2.4 Application of network security protection technology;

2.4. 1 Network security vulnerability scanning technology and its application;

2.4.2 VPN technology and application;

2.4.3 Network disaster recovery backup technology and application;

2.4.4 Log analysis;

3. System safety engineering;

3. 1 access control;

3. 1. 1 access control technology;

3. 1.2 authentication technology? ;

3.2 Demand analysis and design of information system security;

3.2. 1 Information system security requirements analysis;

3.2.2 Security design of information system;

3.3 Configuration and use of information system security products;

3.3. 1 Windows system security configuration;

3.3.2 Linux system security configuration;

3.3.3 Security configuration of the database;

3.4 Information system security assessment;

3.4. 1 Basis and principle of information system security assessment;

3.4.2 Information system security assessment method;

3.4.3 Information system security assessment process;

4. Application of safety engineering;

4. 1 Web security requirements analysis and basic design;

4. 1. 1 Web security threats;

4. 1.2 Web security threat protection technology;

4.2 Demand analysis and basic design of e-commerce security;

4.3 Security application of embedded system;

4.3. 1 embedded system software development;

4.3.2 Mobile intelligent terminal;

4.4 Application of digital watermarking in copyright protection;

4.5 Application of location privacy protection technology;

4.5. 1 Location privacy security threats;

4.5.2 Algorithm and application of k- anonymity model of location privacy.

Tips: Due to the constant change and adjustment of examination policies and contents, the above information provided by Hunting Examination Network is for reference only. If you have any objection, please refer to the contents published by the authoritative department!

Introduce the following free review materials: the learning manual for network administrators in the first half of 2023

Format: DO size: 2472.31kb A few pages of network planners in the second half of 2022.

Format: DO size: 53.74KB

If you have questions about the qualification examination, don't know how to summarize the contents of the test center, and don't know the local registration policy, click on the bottom to consult the hunting test network and get the review materials for free.