Objectives
1. Create a network design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media), and addresses.
2. Install, configure, and test hardware/software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening anti-virus tools, patch management, auditing, and assessment.
3. Construct, implement and document a script or program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis, and assessments.
4. Create a policy or procedure that addresses events such as a disaster recovery plan, a business continuity plan, incident response policy, acceptable usage document, an information security policy, a physical security policy, assessment, or troubleshooting procedures.
5. Develop a research report or implementation plan concerning legal ethical best practices and mandated requirements that pertain to information security.
6. Research, document, test, and evaluate serval current industry information security-based threats, malicious activities, covert methodology, encryption technologies, mitigation techniques, or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity, and availability.