1 Learning Objectives
- Plan proactive strategies to mitigate risks
- Configure routing tables and firewalls to manage traffic and minimize likelihood of network based attacks
- Monitor and assess current and past environment for vulnerabilities
- Provide a solution for identity and access management within a domain or an external environment
- Assess a current environment and recommend redundancy solutions
- Explain the role and implementation of cryptography in securing network traffic through secure transport protocols