Network and Internet Security

Network and Internet Security

Proficiency Level 1
Basic Understanding

Describes common network and Internet security threats and violations.

Describes key features of installed network and Internet security systems.

Documents the differences among intranet and Internet security issues.

Lists commonly used tools and technologies for monitoring the network’s Internet and security force.

Proficiency Level 2
Working Experience

Works with network security monitoring tools for use with network devices or systems.

Participates in the evaluation of potential threats to determine their likelihood and safeguard the network from any occurrence of threats.

Implements existing procedures for handling emergency situations on the network and Internet environment.

Explains the use of remote access through gateway content filtering.

Installs and supports anti-virus software and network sniffers.

Proficiency Level 3
Extensive Experience

Advises the organization on the establishment of intrusion-detection systems to monitor the network and Internet.

Trains others on how to handle common network attacks, understands attack methods, and explains network defense architectures.

Interprets major methods hackers employ to gain access to systems and their respective countermeasures.

Designs network and Internet perimeter protection strategies and creates countermeasures in case of attack.

Coaches others on how to implement Secure Socket Layer technology on e- commerce websites.

Evaluates the benefits gained from network and Internet security process optimization against pre-established goals.

Proficiency Level 4
Subject Matter Expert

Provides insight into the full spectrum of network and Internet security.

Builds best practices for safeguarding network and Internet security.

Designs and institutes business processes to manage network security risks.

Champions the use of new techniques and methods in monitoring network and Internet security.

Leads in the development of contingency plans and disaster recovery procedures for serious breaches.

Plays a leadership role in debating relative merits of alternative encryption algorithms.

Leave a Reply

Your email address will not be published. Required fields are marked *