|
ITS 3031 - Security - Application Defense, Assessments and Audits
Clock Hours: 78
Delivery Mode on-ground
Prerequisites: All ITS 1000 and 2000 series Modules, ITS-3020 Security-Physical, Perimeter and Defense
Industry Certifications TestOut Security Pro, CompTIA Security +
Course Description: The course provides instruction in the areas of Application Defense, Assessments and Audits based on the CompTIA Security+ Certification objective requirements.
Student Learning Outcomes: Course Competencies:
- Given a scenario, analyze indicators of compromise and determine the type of malware.
- Compare and contrast types of attacks.
- Given a scenario, use appropriate software tools to assess the security posture of an organization.
- Given a scenario, differentiate common account management practices.
- Given a scenario, analyze and interpret output from security technologies.
- Given a scenario, implement secure network architecture concepts.
- Given a scenario, implement secure systems design.
- Explain penetration testing concepts.
- Install and configure network components, both hardware- and software-based, to support organizational security.
- Explain the impact associated with types of vulnerabilities.
- Explain the security implications of embedded systems.
- Given a scenario, troubleshoot common security issues.
- Explain the importance of policies, plans and procedures related to organizational security.
- Given a scenario, implement public key infrastructure.
- Given a scenario, deploy mobile devices securely.
- Summarize cloud and virtualization concepts.
- Compare and contrast identity and access management concepts.
- Given a scenario, implement identity and access management controls.
- Compare and contrast identity and access management concepts.
- Explain the importance of secure staging deployment concepts.
- Summarize secure application development and deployment concepts.
- Explain the importance of physical security controls.
- Given a scenario, carry out data security and privacy practices.
- Compare and contrast basic concepts of cryptography.
- Explain cryptography algorithms and their basic characteristics.
- Explain how resiliency and automation strategies reduce risk.
- Summarize business impact analysis concepts.
- Explain disaster recovery and continuity of operation concepts.
|
|