Testing of these skills is covered in this pre-built test because they’re closely related. On our paid plan, you can easily create your own custom multi-skill tests.
When developing software systems, implementing theory and design, and performing maintenance, software engineers use an array of skills to produce high quality software.
Everyone who works with web should know essential topics of network security to prevent unauthorized access or misuse of network-accessible resources.
A protocol defines a set of rules which allows communication between entities. Communication between devices on the Internet is based on multiple protocols. It's an important theoretical topic for all engineers, particularly those involved in communication protocols.
Web Application Security
Web development is the process of developing websites or web applications, which can be hosted on a public network (Internet) or a private one (intranet).
Web Application Security
Web application security is a branch of information security that deals specifically with security of websites, web applications, and web services.
Authorization is the function of specifying access rights/privileges to resources.
Cross Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated. Knowing how to prevent CSRF is important for all developers who work on web applications.
Encryption is a process that converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Understanding encryption is important for everyone who works with security sensitive information.
As the majority of users will re-use passwords between different applications, it is important to store passwords in a way that prevents them from being obtained by an attacker, even if the application or database is compromised.
Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protects data and maintains functionality as intended.
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. As one of the most common attack techniques, it’s important for all security testers.
Cross-site scripting (XSS) is a type of web application security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
Network administration is the process of managing and maintaining the infrastructure of computer networks. These tasks are usually done by a network administrator/network engineer. Software-network interactions as well as network integrity and resilience are the key areas of focus.
The presentation layer (Layer 6) is one of the seven layers of the Open Systems Interconnection model (OSI model). This layer provides independence from data representation by translating between application and network formats.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Knowledge of firewalls is important for system administrators.
The application layer (Layer 7) is one of the seven layers of the Open Systems Interconnection model (OSI model). It is closest to the end user, which means both the OSI application layer and the user interact directly with the software application.
The Internet Protocol is the principal communications protocol used by the Internet. IP provides the mechanism for delivering packets from source to host computers based on their IP addresses. As the dominant communication protocol used by the internet, it's important for all developers to have a solid understanding of its features.
Recommended Job Roles
These are the job roles that we recommend for the Cybersecurity online test.
Information security analyst
System Administrator (Sysadmin)