This course is designed for Network Operations Specialists and aligns with the NICE requirements for the secure planning, implementation and operation of network services and systems, including hardware and virtual environments. Coverage includes: Security Principles, Network Topologies, Demilitarized Zones, Routers, Switches, Bridges, Firewalls, Wireless Access Points, Transmission Media, and Network Authentication Servers Configuration.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Describe how Network Access Control is used to secure systems and data
- Identify the different types of authentication methods available
- Identify the various types of enforcement methods and network controls available
- Describe the goals of monitoring both system access and system use
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):