Module Overview

Network Security

This module gives the learner a solid foundation-level security skill set and knowledge. It will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.The module will ensure that candidates apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that security personnel are anticipating security risks and guarding against them.

Module Code

HCAP H2011

ECTS Credits

10

*Curricular information is subject to change

Network Security

Implement security configuration parameters on network devices and other technologies. Given a scenario, use secure network administration principles. Explain network design elements and components. Troubleshoot security issues related to wireless networking.

Compliance and Operational Security

Explain the importance of risk related concepts. Summarize the security implications of integrating systems and data with third parties. Given a scenario, implement appropriate risk mitigation strategies, implement basic forensic procedures. Compare and contrast physical security and environmental controls. Summarize risk management best practices.

Threats and Vulnerabilities

Explain types of malware and summarise various types of attacks.Summarize social engineering attacks and the associated effectiveness with each attack.Explain types of wireless attacks, application attacks and select the appropriate type of mitigation and deterrent techniques. Use appropriate tools and techniques to discover security threats and vulnerabilities.

Application, Data and Host Security

Explain the importance of application security controls and techniques, summarise mobile security concepts and technologies.Given a scenario, select the appropriate solution to establish host security. Compare and contrast alternative methods to mitigate security risks in static environments.

Access Control and Identity Management

Compare and contrast the function and purpose of authentication services.Given a scenario, select the appropriate authentication, authorization or access control.Install and configure security controls when performing account management, based on best practices.

Cryptography

Given a scenario, utilize general cryptography concepts.Given a scenario, use appropriate cryptographic methods.Given a scenario, use appropriate PKI, certificate management and associated components.

Module Content & Assessment
Assessment Breakdown %
Other Assessment(s)100