Skip to main content

Unit 2 Learning Objectives

UNIT 3: Securing Networks

  • Topic 2.1: Cyber Foundations
    • 2.1.A: Identify social engineering attacks.
    • 2.1.B: Identify types of adversaries.
    • 2.1.C: Describe the phases of a cyberattack.
    • 2.1.D: Describe the risk assessment process.
    • 2.1.E: Identify strategies for managing risk.
    • 2.1.F: Identify types of security controls.
    • 2.1.G: Explain why a defense-in-depth security strategy is necessary to optimally protect an organization.
  • Topic 2.2: Physical Vulnerabilities and Attacks
    • 2.2.A: Identify common physical attacks.
    • 2.2.B: Explain how threats can exploit common physical vulnerabilities to cause loss, damage, disruption, or destruction to assets.
    • 2.2.C: Assess and document risks from physical vulnerabilities.
  • Topic 2.3: Protecting Physical Spaces
    • 2.3.A: Identify managerial controls related to physical security.
    • 2.3.B: Determine mitigation strategies for risks from physical vulnerabilities.
  • Topic 2.4: Detecting Physical Attacks
    • 2.4.A: Identify ways security controls can detect physical attacks.
    • 2.4.B: Determine effective placement of security controls for detecting physical attacks.
    • 2.4.C: Apply detection techniques to identify physical attacks.