Textbook: Title: Security Policies and Implementation Issues
The course examines controls over personnel, hardware, software, and systems. It also covers possible abuse channels and proper countermeasures.
Identify the appropriate security measures and controls for creating a more secure workspace, including policy and procedure development and compliance with laws and regulations.
Recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability.
Recognize key reconnaissance attack methods and identify different types of administrative management and media storage control.
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Sample Solution