Security Policies and Implementation Issues
The course examines controls over personnel, hardware, software, and systems. It also covers possible abuse channels and proper countermeasures.
Identify the appropriate security measures and controls for creating a more secure workspace, including policy and procedure development and compliance with laws and regulations.
Recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability.
Recognize key reconnaissance attack methods and identify different types of administrative management and media storage control.