Unit 4 Learning Objectives
UNIT 4: Securing Devices
- Topic 4.1: Device Vulnerabilities and Attacks
- 4.1.A: Identify types of computing devices.
- 4.1.B: Identify the type of malware used in a cyberattack.
- 4.1.C: Explain how adversaries can exploit common device vulnerabilities to cause loss, damage, disruption, or destruction.
- 4.1.D: Assess and document risks from device vulnerabilities.
- Topic 4.2: Authentication
- 4.2.A: Explain why hashes (also called hash outputs, checksums, message digests, or digests) are used to store passwords.
- 4.2.B: Explain how password attacks exploit vulnerabilities.
- 4.2.C: Determine the type of authentication used to verify the identity of a user.
- 4.2.D: Configure login settings to make a device more secure.
- Topic 4.3: Protecting Devices
- 4.3.A: Identify managerial controls related to device security.
- 4.3.B: Explain how anti-malware software can make a device more secure.
- 4.3.C: Explain why keeping a device’s operating system and software updated makes it more secure.
- 4.3.D: Configure a host-based firewall.
- Topic 4.4: Detecting Attacks on Devices
- 4.4.A: Explain how to detect attacks against devices.
- 4.4.B: Determine controls for detecting attacks against a device.
- 4.4.C: Evaluate the impact of a device detection method.
- 4.4.D: Apply detection techniques to identify indicators of password attacks by analyzing log files.