Good security specialists know that everything has a cost, security for sake of security is not a good quality to have. Instead everything must be framed as providing value for the company/business. Just like in software, everything is about trade-offs. Balancing risk for e.g. cost or convenience is something that should be mentioned.

  1. How is Encryption different from Hashing?
  2. Describe your home network or lab.
  3. What is the OSI Model?
  4. Which is more secure: open source or closed source?
  5. Which security Framework is best?
  6. What is the primary goal of cybersecurity?
  7. What is a Risk, a Threat, and Vulnerability?
  8. Why are preventative controls better than detective controls or vice-versa?
  9. Where do you get your security news from?
  10. Should you compress or Encrypt first?
  11. What are the most important files in Linux?
  12. What are HTTP status codes that a web server will return?
  13. What’s the difference between Vulnerability Assessments and Penetration Tests?
  14. What’s the most important thing you need for a Penetration Test?
  15. What are tools that Hackers use?
  16. What is the MITRE ATT&CK Framework?
  17. What are common cyber attacks?
  18. How can we determine if an email is legitimate?
  19. What is a brute force attack? How can we prevent brute force attacks?
  20. What is SQL injection (SQLi)? How can we prevent SQL injection (SQLi)?

How to become a Hacker, a guide by Pirate Software