CLUSTER Engineering and Technical s9

CLUSTER Engineering and Technical s9

<p>CLUSTER Engineering and Technical</p><p>COURSE Secure Network Essentials</p><p>WVEIS CODE 1696</p><p>Course Description: This course introduces the student to the knowledge base and technical skills required of foundation-level security practitioners. Areas of study include general security concepts, communication security, infrastructure security, basics of cryptography and operational/organizational security. Students will demonstrate knowledge and technical expertise in designing and implementing secure systems. Emphasis will be placed on personal and professional ethics, and students will explore a variety of career opportunities. Students will utilize problem- solving techniques and participate in laboratory activities to develop an understanding of course concepts, and teachers should provide each student with real world learning opportunities and instruction related to occupations in networking. Safety instruction is integrated into all activities.</p><p>SKILL SETS General Security Concepts Communications Security Infrastructure Security Basics of Cryptography Operational and Organizational Security Secure Network Essentials WVEIS 1696</p><p>Skill Set Personal Computer Components Knowledge Objectives Students will demonstrate knowledge of</p><p>1696.1  common security concepts. Performance Objectives Students will</p><p>1696.2  differentiate among common access control models. 1696.3  differentiate among common authentication methods. 1696.4  implement appropriate actions to reduce the risks of non-essential services and protocols. 1696.5  specify appropriate actions to mitigate vulnerability and risk against common types of attacks. 1696.6  specify appropriate actions to mitigate vulnerability and risk against common types of malicious code. 1696.7  examine methods to reduce the risks of social engineering. 1696.8  examine methods of auditing, logging and system scanning. Skill Set Communications Security Knowledge Objectives Students will demonstrate knowledge of</p><p>1696.9  common methods for insuring the security of communications. Performance Objectives Students will</p><p>1696.10  examine common types of remote access technologies. 1696.11  examine common email security concepts. 1696.12  examine common Internet security concepts. 1696.13  examine common directory security concepts. 1696.14  examine common file transfer protocols and concepts. 1696.15  examine common wireless technologies and concepts. Skill Set Infrastructure Security Knowledge Objectives Students will demonstrate knowledge of</p><p>1696.16  concepts of infrastructure security. Performance Objectives Students will</p><p>1696.17  examine security concerns and concepts of common types of devices. 1696.18  examine security concerns for common types of media. 1696.19  examine concepts behind common kinds of Security Topologies. 1696.20  implement and configure common types of intrusion detection systems. 1696.21  examine the concepts of Security Baselines. Skill Set Basics of Cryptography Knowledge Objectives Students will demonstrate knowledge of</p><p>1696.22  concepts and methodologies of cryptography. Performance Objectives Students will</p><p>1696.23  compare common types of cryptographic algorithms. 1696.24  determine the relationship between cryptography and common security concepts of confidentiality, integrity, authentication, non-repudiation and access control. 1696.25  examine the concepts of PKI (Public Key Infrastructure). 1696.26  differentiate among different cryptographic standards and protocols. 1696.27  examine the concepts of Key Management and Certificate Lifecycles. Skill Set Operational and Organizational Security Knowledge Objectives Students will demonstrate knowledge of</p><p>1696.28  various policies and procedures related to operational and organizational security. Performance Objectives Students will</p><p>1696.29  apply common concepts of physical security. 1696.30  examine the security implications of disaster recovery. 1696.31  examine the security implications of business continuity. 1696.32  examine the concepts and uses of security policies and procedures. 1696.33  examine the concepts of privilege management. 1696.34  examine the concepts of forensics. 1696.35  examine the concepts of risk identification. 1696.36  determine the importance of training of end users, executives and human resources in security issues. 1696.37  examine the concepts of security documentation.</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us