IT Security/Objectives/Security Operations
4.1 Given a scenario, apply common security techniques to computing resources.
edit
|
|
4.2 Explain the security implications of proper hardware, software, and data asset management.
edit
|
|
4.3 Explain various activities associated with vulnerability management.
edit
|
|
4.4 Explain security alerting and monitoring concepts and tools.
edit
|
|
4.5 Given a scenario, modify enterprise capabilities to enhance security.
edit
|
|
4.6 Given a scenario, implement and maintain identity and access management.
edit
|
|
4.7 Explain the importance of automation and orchestration related to secure operations.
edit
|
|
4.8 Explain appropriate incident response activities.
edit
|
|
4.9 Given a scenario, use data sources to support an investigation
edit
|
|