Get in Touch

Course Outline

  • Access Controls
  • Security Operations and Administration
  • Implement and use risk identification, monitoring, and analysis methodologies
  • Understand incident response and recovery management
  • Understand cryptography principles
  • Understand network and communications security
  • Know systems and application security principles

Requirements

Experience in information technology fields
Foundational knowledge of network devices and infrastructure

 35 Hours

Testimonials (3)

Related Categories