| Week 6 – 59 pages and 30 multiple choice questions | |||||
|---|---|---|---|---|---|
| Chapter 18 – focus on the purpose of the protocols and not port numbers – you can use my port number flashcards 2 days before you test, more important you understand the function of the protocols | |||||
| Read Chapters 13, 14 and 15 again | |||||
| Chapter 16 – Explain various activities associated with vulnerability management – 17 pages
Chapter 17 – Explain security alerting and monitoring concepts and tools – 14 pages Chapter 18 – Given a scenario, modify enterprise capabilities to enhance security – 28 pages
|
|||||
| Action – Ian’s Book | Key Elements | ||||
|
Firewall rules and settings
IDS/IPS Web filtering Operating system security Secure protocols DNS filtering Email security File integrity monitor Data Loss Prevention Network access control EDR/XDR User behavior analytics Provisioning/deprovisioning user accounts Identity proofing SSO Attestation Access controls MFA Factors of authentication Password concepts PAM tools Automation/scripting Automation benefits Workforce multiplier Cost considerations Technical debt Single point of failure
|
||||