1.
|
Explain the need for authentication methods and available solutions.
(I)
|
2.
|
Implement appropriate access control methods and demonstrate
techniques for monitoring access to network resources. (II)
|
3.
|
Apply cryptographic methods to ensure data integrity and privacy.
(III)
|
4.
|
Explain the elements of Public Key Infrastructure and how to plan for
implementation. (IV)
|
5.
|
Identify the types of threats to networks and the steps to take to
reduce these threats. (V)
|
6.
|
Identify vulnerabilities in operating system software and network
devices, and implement measures to mitigate these vulnerabilities.
(VI)
|
7.
|
Demonstrate methods to secure remote access to network resources.
(VII)
|
8.
|
Identify weaknesses in wireless technology and implement measures to
secure wireless environments. (VIII)
|
9.
|
Explain the methods used to design and maintain a secure network
infrastructure. (IX)
|
10.
|
Explain the techniques used to assess risk, detect network intrusions
and ensure the continuity of network resources. (X)
|
11.
|
Describe the elements of effective security policies in a business
environment. (XI)
|
|