. Differentiate among various systems security threats.
Explain the security risks pertaining to system hardware and peripherals
Implement OS hardening practices and procedures to achieve workstation and server security.
Carry out the appropriate procedures to establish application security
Implement security applications.
Explain the purpose and application of virtualization technology