
信息安全技術(shù)專家Security+認(rèn)證培訓(xùn)
1.0 Network Security 網(wǎng)絡(luò)安全
網(wǎng)絡(luò)設(shè)備和其他設(shè)備上實(shí)施安全配置參數(shù)(Implement security configuration parameters on network devices and other technologies. )
給定一個(gè)場(chǎng)景,應(yīng)用安全網(wǎng)絡(luò)管理原則(given a scenario,use secure network a dministration principles. )
解釋網(wǎng)絡(luò)設(shè)計(jì)的元素和組件。(Explaain network design elements and components. )
給定一個(gè)場(chǎng)景,實(shí)施通用的協(xié)議和服務(wù)(Given a scenario, implement common protocols and services. )
給定一個(gè)場(chǎng)景,對(duì)無線組網(wǎng)中的安全問題進(jìn)行故障排(Given a scenario,troubleshoot security issues related to wireless networking. )
2.0 Compliance and Operational Security 合規(guī)與運(yùn)維安全
解釋風(fēng)險(xiǎn)相關(guān)概念的重要性(Explain the importance of risk related concepts.)
總結(jié)與第三方集成系統(tǒng)與數(shù)據(jù)的安全含義(Summarize the security implications of integrating systems and data with third parties.)
給定一個(gè)場(chǎng)景,實(shí)施正確的風(fēng)險(xiǎn)降低策略(Given a scenario,implement appropriate risk mitigation strategies.)
給定一個(gè)場(chǎng)景,實(shí)施基本的取證程序(Given a scenario,implement basic forensic procedures.)
總結(jié)通用的事件響應(yīng)程序(Summarize common incident response procedures.)
解釋安全相關(guān)意識(shí)和培訓(xùn)的重要性(Explain the importance of security related awareness and training.)
總結(jié)風(fēng)險(xiǎn)管理的佳實(shí)踐(Summarize risk management best practices.)
給定一個(gè)場(chǎng)景,選擇合適的控制來滿足安全目標(biāo)(Given a scenario,select the appropriate control to meet the goals of security.)
解釋各種惡意軟件(Explain types of malware.)
總結(jié)不同類型的攻擊(Summarize various types of attacks.)
總結(jié)社會(huì)工程攻擊和相關(guān)每個(gè)攻擊的有效性(Summarize social engineering attacks and the associated effectiveness with each attack. )
解釋無線攻擊的類型(Explain types of wireless attacks.)
3.0 Threats and Vulnerabilities 威脅與漏洞
解釋各種惡意軟件(Explain types of malware.)
總結(jié)不同類型的攻擊(Summarize various types of attacks.)
總結(jié)社會(huì)工程攻擊和相關(guān)每個(gè)攻擊的有效性(Summarize social engineering attacks and the associated effectiveness with each attack. )
解釋無線攻擊的類型(Explain types of wireless attacks.)
解釋應(yīng)用攻擊的類型(Explain types of application attacks.)
Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
Given a scenario,use appropriate tools and techniques to discover security threats and vulnerabilities.
(解釋如何正確使用滲透測(cè)試與漏洞掃描)Explain the proper use of penetration testing versus vulnerability scanning.
4.0 Application,Data and Host Security 應(yīng)用、數(shù)據(jù)和主機(jī)安全
解釋應(yīng)用安全控制盒技術(shù)的重要性(Explain the importance of application security controls and techniques.)
總結(jié)移動(dòng)安全的概念與技術(shù)(Summarize mobile security concepts and technologies. .)
給定一個(gè)場(chǎng)景,選擇合適的方案來建立主機(jī)安全(Given a scenario,select the appropriate solution to establish host security. )
實(shí)施合適的控制來保障數(shù)據(jù)安全(Implement the appropriate controls to ensure data security.)
Compare and contrast alternative methods to mitigate secuity risks in static environments.
5.0 Access Control and Identity Management 訪問控制與身份管理
比較和對(duì)比認(rèn)證服務(wù)的功能和目標(biāo)(Compare and contrast the function and purpose of authentication services. )
Given a scenario,select the appropriate authentication,authorization or access control.
Install and configure security controls when pertorming account management,based on best practices.
6.0 Cryptgraphy 密碼學(xué)
給定一個(gè)場(chǎng)景,使用通用密碼學(xué)概念(Given a scenario,utilize general cryptography concepts.)
給定一個(gè)場(chǎng)景,使用合適的密碼學(xué)方法(Given a scenario,use appropriate cryptographic methods. )
Given a scenario,use appropriate PKI,certificate management and associated components.