Security + boot camp

 Application, Cryptography, and Host Security

  • Operating Systems and Application Security
  • Hardening the Operating System
  • Working with Data Repositories
  • Host Security
  • Mobile Devices
  • Cryptography Basics
  • Cryptography Algorithms
  • Cryptographic Systems
  • Cryptography Implementations
  • Public Key Infrastructure Page 6 of 6
  • Preparing for Cryptographic Attacks
  • Key Life Cycle

 Physical Security and Network Vulnerabilities

  • Physical and Hardware-Based Security
  • Implementing Access Control’
  • Maintaining Environmental and Power Controls
  • Fire Suppression
  • Security and Vulnerability in the Network
  • Security Threats
  • Secure Network Administration Principals
  • Mitigation and Deterrent Techniques
  • Wireless Networking Security
  • Understanding Mobile Devices
  • Wireless Vulnerabilities

 Data Recovery and Administration

  • Disaster Recovery and Incident Response
  • Understanding Business Continuity
  • Impact Analysis
  • Reinforcing Vendor Support
  • Security-Related Policies and Procedures
  • Security Administration
  • Administrator’s Troubleshooting Guide
  • Access Control Issues
  • Auditing
  • Authentication Schemes
  • Back-Up Management
  • File Sharing Basics
  • Preventing Common Malicious Events