- Mitigate Threats
- Use Cryptography
- Authenticate systems
- Design and implement functional networks
- Describe Wifi systems and deploy WLANs
- Configure, manage, and maintain essential network devices
- Configure, network, synchronize, and troubleshoot of mobile devices
- Better understanding of networking and wireless networking protocols
- Contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes
- Identify basic features of Microsoft Windows editions
- Use the appropriate Microsoft command-line tool
- Use features and tools of the Microsoft Windows 10 operating system (OS)
- Purpose of a project charter
- Project manager’s role in the organizational structure
- Project process groups
- Better understand of the Command Line Interface, CLI, and Bash shell
- Set up permissions
- Describe Kernel modules
- Make effective cloud models
- Cloud Security
- Resource Management
- IT governance in the enterprise with an emphasis on managing risk
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Understand threat and vulnerability management concepts
- Understand how to setup a strong security architecture for your networks
- Understand security operations
- Prepare for a pen test engagement
- Conduct passive reconnaissance
- Perform physical security tests on facilities