4.2 Explain the security implications of improper hardware, software and data asset management

4.3 Explain various activities associated with vulnerability management

4.4 Explain security monitoring and alerting concepts and tools

4.5 Given a scenario, modify enterprise capabilities to enhance security.

4.6 Given a scenario, implement and maintain identity and access management.

4.8 Explain appropriate incident response activities.

4.9 Given a scenario, use data sources to support an investigation.