1 Learning Objectives

  1. Plan proactive strategies to mitigate risks
  2. Configure routing tables and firewalls to manage traffic and minimize likelihood of network based attacks
  3. Monitor and assess current and past environment for vulnerabilities
  4. Provide a solution for identity and access management within a domain or an external environment
  5. Assess a current environment and recommend redundancy solutions
  6. Explain the role and implementation of cryptography in securing network traffic through secure transport protocols