Get in Touch

Course Outline

  • Access Controls
  • Security Operations and Administration
  • Implement and apply risk identification, monitoring, and analysis methodologies
  • Understand how to manage incident response and recovery
  • Grasp the fundamentals of cryptography
  • Understand network and communications security
  • Learn the key principles of systems and application security

Requirements

Experience in Information Technology fields    
Foundational knowledge of network devices and infrastructure

 35 Hours

Number of participants


Price per participant

Testimonials (3)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories