Security Architecture
- 1.1 Given a scenario, analyze the security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network
- 1.2 Given a scenario, analyze the organizational requirements to determine the proper infrastructure security design.
- 1.3 Given a scenario, integrate software applications securely into an enterprise architecture.
- 1.4 Given a scenario, implement data security techniques for securing enterprise architecture.
- 1.5 Given a scenario, analyze the security requirements and objectives to provide the appropriate authentication and authorization controls.
- 1.6 Given a set of requirements, implement secure cloud and virtualization solutions.
- 1.7 Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements.
- 1.8 Explain the impact of emerging technologies on enterprise security and privacy.