Describe policies and procedures used for continuous security monitoring.Describe logical (technical) security threats and vulnerabilities.

Describe assessment techniques used to determine threats and vulnerabilities.

Describe physical security threats and vulnerabilities.

Describe logical (technical) security threats and vulnerabilities.

Summarize required policies to protect information systems:
Acceptable Use Policy (AUP)
Mobiles device Management (MDM)
Personally identifiable information (PII)
Payment Card Industry Data Security Standard (PCI DSS)
Information system secure backup strategies

Describe policies and procedures used for continuous security monitoring.

Describe training and continuing education policies implementation.

Describe a continuity of operations plan to keep the key system operational during a disaster.