Objectives
- Manage risk in the enterprise
- Integrate computing, communications, and business disciplines in the enterprise
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques
- Implement security controls for hosts
- Implement security controls for storage
- Analyze network security concepts, components, and architectures, and implement controls
- Implement security controls for applications
- Integrate hosts, storage, networks, and applications in a secure enterprise architecture
- Conduct vulnerability assessments
- Conduct incident and emergency responses