C & D

Learning aim C: Examine the techniques used to protect an IT system from security threats

Physical security

Policies and procedures

Software-based protection

Learning aim D: Implement strategies to protect an IT system from security
threats

D1 Group policies

D2 Anti-malware protection

D3 Firewall configuration

D4 Wireless security

D5 Access control

D6 Testing and reviewing protection applied to an IT system

D7 Skills, knowledge and behaviours

Network Room Security

Backing-up data

Creating IT disaster recovery plans

Security audits

What to do with factory default settings for hardware and software

What to do about 'Backdoors' to software and hardware

Management of patches

Why security updates should be run.