CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 57

Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities Evaluate and explain from a management perspective the industry-standard equipment, tools, and technologies organizations can employ to mitigate risks and thwart both internal and external attacks. Explain access control methods and attacks. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions. ============================================