CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 60
Evaluate an organization’s security policies and risk
management procedures, and its ability to provide security
countermeasures
Describe the details and the importance of application security
models and their implementation from a management
perspective.
Analyze the methods of managing, controlling, and mitigating
security risks and vulnerabilities
Evaluate and explain from a management perspective the
industry-standard equipment, tools, and technologies
organizations can employ to mitigate risks and thwart both
internal and external attacks.
Explain access control methods and attacks.
Use technology and information resources to research issues in
security management.
Write clearly and concisely about the theories of security
management using proper writing mechanics and technical style
conventions.