IT 515 Vulnerability Assessment
|
IT 525 IT Security
|
IT 528 Wireless Technology Mgmt
|
IT 545 Cyber Security Mgmt
|
IT 573 Cryptography
|
Identify acceptable vulnerability assessment templates
|
Describe the principles of computer systems and network security
|
Describe a wireless local area network (WLAN) and the IEEE standards.
|
Conduct a risk assessment
|
Discuss the number theory
|
Demonstrate the ability to conduct a risk assessment
|
Identify passive and active threats
|
Understand the components of infrastructure and client devices.
|
Develop a business continuity plan
|
Describe how a pseudo-random bit generator works
|
Identify system vulnerabilities, conduct a vulnerability assessment, and produce a final report
|
Develop authentication methods
|
Explain radio frequency (RF) fundamentals
|
Understand the components required for a disaster recovery plan
|
Understand the difference between a block and stream cipher
|
Understand the difference between vulnerability assessment and penetration testing
|
Create firewalls and implement virus prevention methods
|
Describe wireless access methods
|
Identify legal and regulatory compliance conformance criteria
|
Distinguish between private key and public key encryption
|
Identify penetration testing tools
|
Discuss encryption, digital signatures, and biometrics
|
Troubleshoot a WLAN.
|
|
Discuss the various types of hashing functions
|
Performa a system penetration test
|
Apply security to operating systems and applications
|
Design a WLAN site survey
|
|
Describe how message authentication and digital signatures work
|
|
Identify the goals of preserving the integrity of data and preventing unauthorized access to information
|
|
|
|