المخرجات الرئيسية
1
Align overall organizational operational goals with security functions and implementations.
2
Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
3
List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7.
4
Identify standard terms for applying physical and logical access controls to environments related to their security practice.
5
Appraise various access control models to meet business security requirements.
6
Name primary methods for designing and validating test and audit strategies that support business requirements.
7
Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.