4.0 Network Security
[4.1] Explain common security concepts
Confidentiality, Integrity, Availability (CIA)
Threats
Vulnerabilities
Exploits
Least Privilege
Role-Based Access
Zero Trust
Defense in Depth
Authentication Methods
Risk Management
Security Information and Event Management (SIEM)
[4.2] Compare and contrast common types of attacks
Technology-Based
Human and Environmental
[4.3] Given a scenario, apply network hardening techniques
Best Practices
Wireless Security
IoT Access Considerations
[4.4] Compare and contrast remote access methods and security implications
Site-to-Site VPN
Client-to-Site VPN
Remote Desktop Connection
Remote Desktop Gateway
SSH
Virtual Network Computing (VNC)
Virtual Desktop
Authentication and Authorization Considerations
In-Band vs. Out-of-Band Management
[4.5] Explain the importance of physical security
Detection Methods
Prevention Methods
Asset Disposal
Last updated