Skip to main content

Unit 4 Learning Objectives

UNIT 4: Securing Devices

  • Topic 4.1: Device Vulnerabilities and Attacks
    • 4.1.A: Identify types of computing devices.
    • 4.1.B: Identify the type of malware used in a cyberattack.
    • 4.1.C: Explain how adversaries can exploit common device vulnerabilities to cause loss, damage, disruption, or destruction.
    • 4.1.D: Assess and document risks from device vulnerabilities.
  • Topic 4.2: Authentication
    • 4.2.A: Explain why hashes (also called hash outputs, checksums, message digests, or digests) are used to store passwords.
    • 4.2.B: Explain how password attacks exploit vulnerabilities.
    • 4.2.C: Determine the type of authentication used to verify the identity of a user.
    • 4.2.D: Configure login settings to make a device more secure.
  • Topic 4.3: Protecting Devices
    • 4.3.A: Identify managerial controls related to device security.
    • 4.3.B: Explain how anti-malware software can make a device more secure.
    • 4.3.C: Explain why keeping a device’s operating system and software updated makes it more secure.
    • 4.3.D: Configure a host-based firewall.
  • Topic 4.4: Detecting Attacks on Devices
    • 4.4.A: Explain how to detect attacks against devices.
    • 4.4.B: Determine controls for detecting attacks against a device.
    • 4.4.C: Evaluate the impact of a device detection method.
    • 4.4.D: Apply detection techniques to identify indicators of password attacks by analyzing log files.