Hello Everyone, I’m working as an Cyber Security Analyst having around 1 year of working experience. In this article I’ll be sharing useful resources, tips & interview questions for all Cyber Security Freshers.
To excel in a Cyber Security interview as a fresher, it is important to have a foundational understanding of Cyber Security concepts, rather than being a pro. Therefore, prioritize clearing the basics and fundamentals before diving into advanced topics. This approach can increase your chances of success in the interview.
- What are Network Devices ? Repeater, Hub, Switch, Bridge, Router.
- What is an IP address, Classes of IP address ?
- Common Protocols & Port No. (FTP, SSH, TLS, SMTP, DNS, HTTP, LDAP, HTTPS, RDP, ARP, DHCP etc)
- Explain OSI & TCP/IP Model (Mostly OSI model is asked)
- What is 3-Way Handshake?
- What is a Firewall and types of firewall.
- Difference in Stateless and Statefull Firewall?
- What is IDS(Intrusion Detection System) & IPS (Intrusion Prevention System) ? Difference between them.
- What is the difference in HIDS and NIDS?
- What is VPN and types of VPN?
- What is WAF(Web Application Firewall)?
- What is DNS (Domain Name System) ? How DNS works.
- What are proxy server?
- What is the difference in NAT & PAT ?
- What is DMZ (Demilitarized zone)?
- What is cryptography?
- Difference in symmetric and asymmetric cryptography?
- Difference in Encryption, hashing & encoding ?
- What is salted hash?
- What is SSL and TLS ?
- What is CIA triad? (Confidentiality, Integrity & Availability)
- What is Vulnerability, Threat & Risk ?
- Difference in V.A (Vulnerability assessment) and P.T(Penetration testing) ?
- What is AAA ? ( Authentication, Authorization & Accounting)
- What is Social Engineering attack?
- What is phishing attack ? Types of phishing attacks (Vishing, Smishing, Spear Phishing, Whaling, Shoulder Surfing)
- What is a malware ? Different types of malware. (Virus, Worm, Ransomware, Trojan Horse, Backdoor, Rootkits, Adware, Spyware)
- What is port scanning?
- What is Spoofing ?
- What is Brute Force Attack and how to prevent it?
- What is Dictionary attack & Rainbow attack?
- What is MITM (Man in The Middle Attack)?
- What is DOS & DDOS attack .Difference between them and how to prevent it?
- What is botnet?
- What is vulnerability management?
- What is 2FA (Two Factor Authentication)?
- What is SSO (Single Sign On)?
- What is OWASP Top 10?
- What is SQL injection and how to prevent it ?
- What is XSS (Cross Site Scripting )? Types of XSS and how to prevent it?
- What is CSRF (Cross Site Request Forgery)? How to prevent it?
- What is IDOR (Insecure direct object references)?
- What is Broken Authentication and how to prevent it?
- What is Identity & Access Management (IAM)?
- What is DHCP ? How DHCP works.
- What is ISO 27001 Framework ?
- What is PCI -DSS compliance ?(Payment Card Industry Data Security Standards)
- What is HIPAA ? (Health Insurance Portability and Accountability Act)
- What are the recent attacks?
- What is log4j vulnerability?
- What is DLP ? (Data Loss Prevention)
- What is Kerberos authentication ?
- What is NIST Framework?
- What is Zero day attack?
- What is SOC (Security Operation Center)?
- What are the different roles in SOC ?
- What is an event & incident ?
- What is True Positive, False Positive & False Negative ?
- What is SIEM (Security Investigation & Event Management)?
- What is SOAR (Security Orchestration, Automation, and Response)?
- What is EDR (Endpoint Detection & Response)?
- Difference in EDR & Antivirus .
- What is XDR (Extended Detection & Response) ?
- What is Splunk ? Explain its component and architect?
- What is SLA (Service Level Agreement) ?
- Explain Incident Response Life Cycle ?
- What are correlation rules ?
- What is threat intelligence ?
- If a malware is detected, is there any tool to block it directly?
- What is host hardening?
- Explain Cyber kill chain?
- What is a MITRE ATT&CK ?
- What is a playbook?
- What is DWELL time, MTTD & MTTR ?
- What is an IOC (Indicator of Compromise)?
- Certifications are not mandatory for beginners in cybersecurity. Don’t overspend on them. The CompTIA Security+ certification is a good option if you have a budget of around 15–17k.
- Bug bounty hunting should not be motivated by money. Learn from free resources on YouTube and Google. Focus on gaining experience and knowledge.
- During interview always try to make a two way communication.
- Always ask questions from the interviewer at end. Try to understand what the interviewer is looking from an candidate.
- Start working on your resume & Linkedin profile.
- Don’t fake anything in your resume.
- Explore different domains in Cyber Security such as Application Security, SOC (Security Operation Center), Cloud Security, IAM (Identity & Access Management), IT-auditing.
- Make notes of your learning it will gonna help you during interview preparation.
- Prabh Nair Playlist
- Intellipaat Interview questions.
- Edureka Interview questions
- SOC Expert Playlist.
- Github link
- Cyber Community Interview questions.
- Professor Messer Security+ Playlist.
- TryHackme Platform for learning networking & security.
- Letsdefend Platform for SOC.
- Hackthebox Platform for advance learning.
- PicoCTF to practise CTF’s.
- HackerSploit YT Channel.
- BittenTech YT Channel.
Leave a comment below if you’ve any queries or you can connect with me on Linkedin