Posted On 10 August
Capabilities and applications of network equipment including (routers, switches, bridges, servers, transmission media, and related hardware).
Enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
Critical infrastructure systems with information communication technology that were designed without system security considerations.
Network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
Various types of computer architectures.
Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication).
Networking concepts and protocols, and network security attacks, vulnerabilities, processes, methodologies, access control mechanisms, traffic analysis methods, architecture concepts including protocols, components, and principles.
New and emerging information technology (IT) and cybersecurity technologies.
Application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).
Using Virtual Private Network (VPN) devices and encryption.