Final Exam: Security Admin
Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Final Exam: Security Admin will test your knowledge and application of the topics presented throughout the Security Admin track of the Skillsoft Aspire Network Security Specialist to CloudOps Security Architect Journey.
Expected Duration (hours)
0.0
Lesson Objectives Final Exam: Security Admin
apply BCDR planning in various scenarios
categorize different types of web services including CAAS, IAAS, MAAS, PAAS, and SAAS
classify different types of web services including CAAS, IAAS, MAAS, PAAS, and SAAS
compare the privacy and information systems
create a maintenance plan using orchestration units
create business continuity plan and work on its implementation
define data outsourcing and how to prevent loss of control on data
define deceptive information and how to protect data
define internal and external audit and identify various types of audits and audit scope
define patch management, performance monitoring, and backup
define risk profile, appetite, and risk management
define the integration of security services as a service or offering
describe audit and compliance keeping services stacks in mind
describe cloud administration and management
describe cloud under compliance and the need to comply with the attesting bodies
describe deceptive information and how to protect data
describe DRM, different data protection policies, and event handing including SIEM
describe how security policy implementation mitigates cloud security challenges
describe how to secure network operations including network isolation, clans, TLS, DNS, and IPSec
describe how to secure SAAS cloud by focusing on SAAS applications
describe identity access control including details on authentication and authorization
Describe information security and how to manage operations
describe security base parameters and recall what creates baselines
describe supply chain risk, CSA CCM, ISO 28000:2007
describe the business high availability and continuity techniques
describe the data protection guidelines including ISO/IEC 27015:2015, 27002, and EU data protection
describe the evolution of cloud including hardware, software, and server virtualization
describe the importance of encryption in and out of cloud
describe the life cycle of securing data in the cloud
describe the risk management process in logical and physical infrastructures
describe the software development life cycle and issues
describe the standards, such as Internal ISMS, ISO 27001:2013
develop a maintenance plan using orchestration units
Identify cloud model types and their approach towards adopting the model
identify cloud software security measures including security principles and testing
identify common stake holders and governance challenges and how to coordinate communication with them
identify the building blocks of security planning designing and Infrastructure development
identify the different service provider risks including back door spoofing
identify the importance if open-source in cloud infrastructure
identify the importance of control over physical security and assets
identify the software development life cycle and issues
identify various design concepts including logical and physical design
identify various techniques including Crypto, tokenization, data masking, and dip
issue excellent grain queries to get selective access control
list the best practices for servers, storage network, and virtual switches
list the best practices to communicate with vendors, partners, and customers
list the common legislation conflicts and compliance issues
list the importance of encryption and key management
list the key features of dynamic clusters, storage maintenance, and HA on cloud
perform excellent grain queries to get selective access control
recall the importance of control over physical security and assets
recognize the concepts of data handling, hardware, software and breach planning, and secure environment
recognize the concepts relates to contract management and its key components
recognize the core architecture of cloud and importance to data security
recognize the e-discovery process
recognize the importance of control over physical security and assets
recognize the risks and threats involved in cloud computing and their analysis
specify how to provide security on cloud keeping track of limitations including vulnerability of infrastructure, platform, and service
specify the need for cloud datacenter
use secure deployment practices to develop and secure cloud application
Course Number: it_fecosa_02_enus
Expertise Level
Intermediate