2.0 Architecture and Design
2.1 Explain the importance of security concepts in an enterprise environment.
2.2 Summarize virtualization and cloud computing concepts.
2.3 Summarize secure application development, deployment, and automation concepts.
2.4 Summarize authentication and authorization design concepts.
2.5 Given a scenario, implement cybersecurty resilience.
2.6 Explain the security implications of embedded and specialized systems.
2.7 Explain the importance of physical security controls.
2.8 Summarize the basics of cyptographic concepts.