Get in Touch

Course Outline

  • Access Controls
  • Security Operations and Administration
  • Implement and utilize risk identification, monitoring, and analysis methodologies
  • Understand how to manage incident response and recovery
  • Understand cryptography
  • Understand network and communications security
  • Understand systems and application security principles

Requirements

Experience in Information Technology fields
Foundational knowledge of network devices and infrastructure

 35 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories