Use this quick start guide to collect all the information about EXIN CISEF Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the EXIN Cyber and IT Security Foundation (CISEF) exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual EXIN Cyber and IT Security Foundation certification exam.
The EXIN CISEF certification is mainly targeted to those candidates who want to build their career in Data Protection and Security domain. The EXIN Cyber and IT Security Foundation exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of EXIN CISEF.
EXIN CISEF Exam Summary:
Exam Name | EXIN Cyber and IT Security Foundation |
Exam Code | CISEF |
Exam Price | $262 (USD) |
Duration | 60 mins |
Number of Questions | 40 |
Passing Score | 65% |
Schedule Exam | EXIN |
Sample Questions | EXIN CISEF Sample Questions |
Practice Exam | EXIN CISEF Certification Practice Exam |
EXIN CISEF Exam Syllabus Topics:
Topic | Details | Weights |
---|---|---|
TCP/IP Networking - 10% |
||
Nodes, Node Connections & TCP/IP Addressing |
The candidate can... - describe what a node is. - describe how nodes can be connected to each other. - explain the concepts of TCP/IP addressing of both IP v4 and IP v6. |
5% |
OSI Model, TCP/IP Model, Protocols |
The candidate can... - describe the layers and main functionalities of the OSI and TCP/IP models. - explain the main network protocols, what their functionality is and how they fit into the OSI and TCP/IP reference models. |
5% |
Computer Systems - 10% |
||
Computer Architecture, Operating Systems |
The candidate can... - explain the components of a computer system. - describe how an operating system works. - list the main operating systems. |
5% |
Computer System Vulnerabilities |
The candidate can... - identify the most prevalent types of computer system vulnerabilities. |
2.5% |
Computer System Security Measures |
The candidate can... - identify the main security measures related to computer systems. |
2.5% |
Applications & Databases - 15% |
||
Application Development |
The candidate can... - explain the different methods and phases of the systems development life cycle. - describe the advantages and disadvantages of each of the different methods of the systems development lifecycle. - explain how to address security during the systems development life cycle. |
5% |
Databases |
The candidate can... - describe the different database models. - explain the functionality of the database and the database management systems. |
5% |
Security Issues & Countermeasures |
The candidate can... - describe the prevalent security issues related to applications development and databases. - explain the countermeasures against security issues related to applications and databases. |
5% |
Cryptography - 20% |
||
Encryption Methodologies & Standards |
The candidate can... - differentiate between symmetric and asymmetric encryption. - identify encryption algorithms and standards. |
5% |
Digital Signatures, Hashing |
The candidate can... - explain how digital signatures provide for authenticity and non-repudiation. - explain how hashing provides for the integrity of digital information. - describe the main hashing standards. |
5% |
Public Key Infrastructure (Pki) |
The candidate can... - describe the components, parties and processes of a public key infrastructure. - explain what digital certificates and their use cases are. |
5% |
SSL/TLS, Ipsec |
The candidate can... - explain the technology and use cases of SSL/TLS. - explain the technology and use cases of IPSec. |
5% |
Identity & Access Management - 15% |
||
Identification, Authentication, Biometrics, Single Sign-On (SSO), Password Management |
The candidate can... - differentiate between identification and authentication. - describe the main technologies of authentication and two-factor authentication. - explain biometrics and their use cases. - explain the concepts and different types of Single sign-on (SSO). - explain password management and its use cases. |
10% |
Authorization |
The candidate can... - describe how the principles of Need to know, Least privilege and Separation of Duties (SoD) relate to authorization. - describe authorization models such as role-based access control (RBAC) and attribute-based access control (ABAC). - describe the specifications and functionality of OpenID Connect and OAuth. |
5% |
Cloud Computing - 15% |
||
Characteristics & Deployment Models |
The candidate can... - differentiate between the deployment models public cloud, private cloud and hybrid cloud. - explain the service models SaaS, PaaS, IaaS, SECaaS and IDaaS. |
10% |
Risks |
The candidate can... - identify the risks of cloud computing. |
5% |
Exploiting Vulnerabilities - 15% |
||
Attack Categories & Threat Types |
The candidate can... - identify the main attack categories of cybercrime. |
5% |
Actors & Tools |
The candidate can... - recognize Black hat hackers, White hat hackers, Grey hat hackers, Script kiddies and Hacktivists. - identify which tools cybercriminals use. - identify the steps cybercriminals take to exploit vulnerabilities. |
10% |
To ensure success in EXIN CISEF certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for EXIN Cyber and IT Security Foundation (CISEF) exam.