Get in Touch

Course Outline

  • Access Controls
  • Security Operations and Administration
  • Implement and utilize methodologies for risk identification, monitoring, and analysis
  • Understand the management of incident response and recovery
  • Understand cryptography
  • Understand network and communications security
  • Know principles of systems and application security

Requirements

Experience in Information Technology fields.
Foundational knowledge of network devices and infrastructure.

 35 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories