Identify the effects of various hardware and software violations on the system, and recognize how different types of operational and life-cycle assurance are used to secure operations.

Course Competencies/ Learning Objectives

Course Learning Objectives Assessment Method
Recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability. Labs, case project, and exams
Identify the effects of various hardware and software violations on the system, and recognize how different types of operational and life-cycle assurance are used to secure operations. Labs, case project, and exams
Determine the effects of different attacks on the network and identify the consequences of those effects. Labs, case project, and exams
Recognize how different auditing and monitoring techniques are used to identify and protect against system and network attacks. Labs, case project, and exams
Recognize the need for resource protection, distinguish between e- mail protocols, and identify different types of e-mail vulnerability. Labs, case project, and exams
Identify basic mechanisms and security issues associated with the Web, and recognize different technologies for transferring and sharing files over the Internet. Labs, case project, and exams
Recognize key reconnaissance attack methods and identify different types of administrative management and media storage control. Labs, case project, and exams
Identify the appropriate security measures and controls for creating a more secure workspace. Labs, case project, and exams

 

"Order a similar paper and get 15% discount on your first order with us
Use the following coupon
"FIRST15"

Order Now