Threats to network communications
Identify threats to network communications and the use of cryptosystems to
protect network traffic.
Describe the risks associated with different layers of connectivity, the needs
of a message in transit, and how to plan a network communications structure
to meet business objectives.
Define operating system security and its importance.
Describe common operating systems, how to harden them, and their backup
and recovery
Identify the differences between data and information, explain the purpose of
normalization, and define a data model.
Explain Relational Theory and use basic SQL commands.
Identify attacks to programming languages and mitigation methods to prevent
spurious inputs.
Determine the risks in using external Application Programming Interfaces
(API) and libraries, specify the threats to the most common programming
languages, and, if possible, investigate the programming languages used in
your system.

