- . Differentiate among various systems security threats.
- Explain the security risks pertaining to system hardware and peripherals
- Implement OS hardening practices and procedures to achieve workstation and server security.
- Carry out the appropriate procedures to establish application security
- Implement security applications.
- Explain the purpose and application of virtualization technology