Weight | Outcomes | Applied Learning | Specialized Knowledge | Intellectual Skills | Integrative/Broad Knowledge | Civic Learning | ||
9.1% | Identify common threats to network security. | 20% | 20% | 20% | 20% | 20% | ||
9.1% | Explain how Kerberos, CHAP, certificates, tokens, and biometrics enhance security. | 20% | 20% | 20% | 20% | 20% | ||
9.1% | Differentiate between common attacks such as DDos, Man-in-the-middle, spoofing, session hijacking, and software exploitation. | 25% | 25% | 25% | 25% | 0% | ||
9.1% | Secure a network to permit remote access via VPN. | 25% | 25% | 25% | 25% | 0% | ||
9.1% | Understand and mitigate common e-mail vulnerabilities. | 25% | 25% | 25% | 25% | 0% | ||
9.1% | Understand and plan for Web security via browser configuration. | 20% | 20% | 20% | 20% | 20% | ||
9.1% | Share files in a secure manner using Sharing and NTFS permissions. | 20% | 20% | 20% | 20% | 20% | ||
9.1% | Apply security to a wireless access point, including non-broadcast of SSID, use of WPA, and configuration of shared keys. | 50% | 25% | 0% | 25% | 0% | ||
9.1% | Secure network devices such as servers, switches, and routers. | 50% | 25% | 0% | 25% | 0% | ||
9.1% | Understand and implement physical security of assets. | 20% | 20% | 20% | 20% | 20% | ||
9.1% | Explain how to create and maintain a basic security policy, including disaster recovery. | 20% | 20% | 20% | 20% | 20% |