+ authentication methods, Sing SIGN-ON
+ hierarchical access control
+ password behaviors
+ "clean desk policy"
+ monitoring, logging, system checking
comptia security + certification
security functions and working methods of network
components + firewall, routers, proxies, VPNs,
setting up administrative security principles
+ guidelines, VLANS, port security, ...
communication security Establishment and secure management of remote access technologies
+ Internet security concepts (access, data transmission, redundancy)
+ secure e-mail technologies and methods
+ security of directory services
+ Protection of infrastructure information (DNS, routing, ...)
+ Remote access - technologies and methods
+ Protection of data transmission with different partners
+ Virtual Private Network (s) - concepts, architecture and use
+ WLAN security
+ Encrypted protocols
Security in network design
+ Perimeter network, NAT, RAS, subnetting, ....
Operational / organizational security Physical security
+ Physical security
+ Four-eyes principle
+ Effects of disaster recovery on security
+ Effects of security on business continuity
+ Audits - content, planning, Implementation, frequency
+ authorization management
+ Change management
+ Security policy
concepts Disaster recovery, backups
Detection and elimination of risks and vulnerabilities
+ Risk assessment, probability of attack ..
Detection of malware, viruses and other harmful software
Detection and defense against attacks
+ Man-in-the-middle, DOS, DDOS, SMurftrack, .....
+ social engineering, application attacks , ....
installing assessment tools and techniques
+ protocol analyzer, sniffers, port scanners, ....
+ forensic methods
application and host security
access control and identification management
Basics of cryptography
+ cryptographic Algorithms, Standards and Protocols
+ Public Key Infrastructure, Certificates
+ Key Management
+ Attack Procedures and Attacks
Awakening and importance of the security awareness of employees
Documentation
No comments:
Post a Comment