Get in Touch

Course Outline

  • Access Controls
  • Security Operations and Administration
  • Implement and apply risk identification, monitoring, and analysis methodologies
  • Manage Incident Response and Recovery processes
  • Understand Cryptography
  • Understand Network and Communications Security
  • Know Systems and Application Security principles

Requirements

Experience in Information Technology fields
Foundational knowledge of network devices and infrastructure

 35 Hours

Testimonials (3)

Upcoming Courses

Related Categories