Section 1 Notes
1.1a Describe confidentiality, integrity, availability (CIA)
1.1b Describe SIEM technology
1.1c Identify common security terms
1.1d Identify common network security zones
1.2a Identify common network attacks
1.2b Describe social engineering
1.2c Identify malware
1.2d Classify the vectors of data loss/exfiltration