Security Engineering and Cryptography
- 3.1 Given a scenario, apply secure configurations to enterprise mobility.
- 3.2 Given a scenario, configure and implement endpoint security controls.
- 3.3 Explain security considerations impacting specific sectors and operational technologies.
- 3.4 Explain how cloud technology adoption impacts organizational security.
- 3.5 Given a business requirement, implement the appropriate PKI solution.
- 3.6 Given a business requirement, implement the appropriate cryptographic protocols and algorithms.
- 3.7 Given a scenario, troubleshoot issues with cryptographic implementations.