JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Gallery
Security+
1.0 Threats, Attacks, and Vulnerabilities.
2.0 Architecture and Design
3.0 Implementation
4.0 Operations and Incident Response
5.0 Governance, Risk, and Compliance
Practice Tests
More
Share
Explore
2.0 Architecture and Design
2.1 Explain the importance of security concepts in an enterprise environment
2.2 Summarize virtualization and cloud computing concepts
2.3 Summarize secure application development, deployment, and automation concepts.
2.4 Summarize authentication and authorization design concepts
2.5 Given a scenario, implement cybersecurity resilience.
2.6 Explain the security implications of embedded and specialized systems
2.7 Explain the Importance of physical security controls
2.8 Summarize the basics of cryptographic concepts
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.