Section 3: Learning Outcomes and Objectives
Upon completion of this course, the
student will be able to:
- examine criteria to measure the exposure and risk of
internal and external security threats to the network,
system infrastructure and resources.
- examine the tangible and intangible costs of
breaches to an organization's security, network
resources and proprietary information.
- analyze the benefits of secure authentication and
complex password techniques vs. the costs of
administration and system complexity.
- examine different methods of common network attacks,
including the malicious program code and scripts used to
initiate these attacks.
- configure secure remote access to network
information and resources utilizing several different
methods.
- implement protective measures and evaluate the
adequacy of physical site security relative to risk.
- configure operating system security and evaluate its
effectiveness.
- compare and contrast different intrusion detection
procedures, software programs and methodologies.
|