| Week 5 – 39 pages and 30 multiple choice questions | |||||
|---|---|---|---|---|---|
| Read Chapters 10, 11 amd 12 | |||||
| Chapter 13 – Explain the importance of resilience and recovery in security architecture – 16 pages
Chapter 14 – Given a scenario, apply common security techniques to computing resources – 16 pages Chapter 15 – Explain the security implications of proper hardware, software and data asset management – 8 pages |
|||||
| Action – Ian’s Book | Key Elements | ||||
|
High availability
Site Considerations Capacity Planning Testing Backups Power Secure baselines Hardening targets Wireless Devices Mobile devices Mobile solutions Wireless security settings Application security Sandboxing Monitoring Aquisitions/procurement Assignment/accounting Monitoring/asset tracking Disposal/decommissioning
|
||||