< IT Security < Objectives
IT Security/Objectives/Security Operations
4.1 Given a scenario, apply common security techniques to computing resources.
|
|
4.2 Explain the security implications of proper hardware, software, and data asset management.
|
|
4.3 Explain various activities associated with vulnerability management.
|
|
4.4 Explain security alerting and monitoring concepts and tools.
|
|
4.5 Given a scenario, modify enterprise capabilities to enhance security.
|
|
4.6 Given a scenario, implement and maintain identity and access management.
|
|
4.7 Explain the importance of automation and orchestration related to secure operations.
|
|
4.8 Explain appropriate incident response activities.
|
|
4.9 Given a scenario, use data sources to support an investigation
|
|
This article is issued from Wikiversity. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.