 |
Recognize the services offered by cryptography and recommend those services to an organization to address their specific needs |
|
 |
Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation |
|
 |
Explain the role of key management in cryptography |
|
 |
Explain specific guidelines which need to be considered when deploying cryptographic systems |
|
 |
Select the best practices of key management in a design situation |
|
 |
Describe the standards and procedures used with the PKI |
|
 |
Explain the limitations of PKI technologies in various security designs |
|
 |
Design secure VPN's using various VPN technologies |
|
 |
Identify the benefits and drawbacks of each VPN technology |
|
 |
Implement basic IPSec using all currently supported encryption and authentication mechanisms |
|
 |
Deploy IKE to increase the scalability of IPSec solutions |
|
 |
Design and implement site-to-site VPNs using IPSec |
|
 |
Design and implement remote access VPNs using IPSec |
|
 |
List the software products used to form the management of IPSec devices and solutions |
|
 |
Design and implement secure wireless networks |