3.0 Implementation
3.1 Given a scenario, implement secure protocols.
3.2 Given a scenario, implement host or application security solutions.
3.3 Given a scenario, implement secure network design.
3.4 Given a scenario, install and configure wireless security settings.
3.5 Given a scenario, implement secure mobile solutions.
3.6 Given a scenario, apply cybersecurity solutions to the cloud.
3.7 Given a scenario, implement identity and account management controls.
3.8 Given a scenario, implement authentication and authorization solutions.
3.9 Given a scenario, implement public key infrastructure.