
信息安全技術專家Security+認證培訓
1.0 Network Security 網絡安全
網絡設備和其他設備上實施安全配置參數(Implement security configuration parameters on network devices and other technologies. )
給定一個場景,應用安全網絡管理原則(given a scenario,use secure network a dministration principles. )
解釋網絡設計的元素和組件。(Explaain network design elements and components. )
給定一個場景,實施通用的協議和服務(Given a scenario, implement common protocols and services. )
給定一個場景,對無線組網中的安全問題進行故障排(Given a scenario,troubleshoot security issues related to wireless networking. )
2.0 Compliance and Operational Security 合規與運維安全
解釋風險相關概念的重要性(Explain the importance of risk related concepts.)
總結與第三方集成系統與數據的安全含義(Summarize the security implications of integrating systems and data with third parties.)
給定一個場景,實施正確的風險降低策略(Given a scenario,implement appropriate risk mitigation strategies.)
給定一個場景,實施基本的取證程序(Given a scenario,implement basic forensic procedures.)
總結通用的事件響應程序(Summarize common incident response procedures.)
解釋安全相關意識和培訓的重要性(Explain the importance of security related awareness and training.)
總結風險管理的佳實踐(Summarize risk management best practices.)
給定一個場景,選擇合適的控制來滿足安全目標(Given a scenario,select the appropriate control to meet the goals of security.)
解釋各種惡意軟件(Explain types of malware.)
總結不同類型的攻擊(Summarize various types of attacks.)
總結社會工程攻擊和相關每個攻擊的有效性(Summarize social engineering attacks and the associated effectiveness with each attack. )
解釋無線攻擊的類型(Explain types of wireless attacks.)
3.0 Threats and Vulnerabilities 威脅與漏洞
解釋各種惡意軟件(Explain types of malware.)
總結不同類型的攻擊(Summarize various types of attacks.)
總結社會工程攻擊和相關每個攻擊的有效性(Summarize social engineering attacks and the associated effectiveness with each attack. )
解釋無線攻擊的類型(Explain types of wireless attacks.)
解釋應用攻擊的類型(Explain types of application attacks.)
Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
Given a scenario,use appropriate tools and techniques to discover security threats and vulnerabilities.
(解釋如何正確使用滲透測試與漏洞掃描)Explain the proper use of penetration testing versus vulnerability scanning.
4.0 Application,Data and Host Security 應用、數據和主機安全
解釋應用安全控制盒技術的重要性(Explain the importance of application security controls and techniques.)
總結移動安全的概念與技術(Summarize mobile security concepts and technologies. .)
給定一個場景,選擇合適的方案來建立主機安全(Given a scenario,select the appropriate solution to establish host security. )
實施合適的控制來保障數據安全(Implement the appropriate controls to ensure data security.)
Compare and contrast alternative methods to mitigate secuity risks in static environments.
5.0 Access Control and Identity Management 訪問控制與身份管理
比較和對比認證服務的功能和目標(Compare and contrast the function and purpose of authentication services. )
Given a scenario,select the appropriate authentication,authorization or access control.
Install and configure security controls when pertorming account management,based on best practices.
6.0 Cryptgraphy 密碼學
給定一個場景,使用通用密碼學概念(Given a scenario,utilize general cryptography concepts.)
給定一個場景,使用合適的密碼學方法(Given a scenario,use appropriate cryptographic methods. )
Given a scenario,use appropriate PKI,certificate management and associated components.