Get in Touch

Course Outline

  • Access Controls
  • Security Operations and Administration
  • Implementing and utilizing risk identification, monitoring, and analysis methodologies
  • Understanding incident response and recovery management
  • Understanding cryptography
  • Understanding network and communication security
  • Knowledge of systems and application security principles

Requirements

Experience in Information Technology fields
Foundational knowledge of network devices and infrastructure

 35 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories