IT Security/Objectives/Security Operations
Appearance
4.1 Given a scenario, apply common security techniques to computing resources.
[edit | edit source]
|
|
4.2 Explain the security implications of proper hardware, software, and data asset management.
[edit | edit source]
|
|
4.3 Explain various activities associated with vulnerability management.
[edit | edit source]
|
|
4.4 Explain security alerting and monitoring concepts and tools.
[edit | edit source]
|
|
4.5 Given a scenario, modify enterprise capabilities to enhance security.
[edit | edit source]
|
|
4.6 Given a scenario, implement and maintain identity and access management.
[edit | edit source]
|
|
4.7 Explain the importance of automation and orchestration related to secure operations.
[edit | edit source]
|
|
4.8 Explain appropriate incident response activities.
[edit | edit source]
|
|
4.9 Given a scenario, use data sources to support an investigation
[edit | edit source]
|
|