This course reviews and reinforces knowledge and skills needed to implement, monitor and administer IT infrastructure using cybersecurity best practices. Cyber industry topics covered include security operations and administration; access controls; risk identification, monitoring and analysis; incident response and recovery; cryptography; network and communications security; and systems and application security.
Learning Objectives
- Students learn to identify organizational information assets, and discuss the process to document policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability, demonstrate the underlying principles of access control systems and how to implement, manage and secure those systems, including internetwork trust architectures, federated identity management, identity management lifecycle, and various access, identify, evaluate, and prioritize organizational potential threats, and demonstrate the robust application of resources to monitor, manage, and mitigate those threats, evaluate and conduct risk management concepts, assessment activities, and monitoring terminology, techniques, and systems to mitigate information security risks within the organization, discuss effective incident handling processes and procedures to facilitate efficient and effective processes in addressing security incidents, supporting forensic investigations, business continuity planning (BCP), and disaster recovery planning (DRP), demonstrate the understanding of organizational cryptographic concepts, methodologies, and technologies; as it applies in the legal and regulatory requirements, key management concepts, public key infrastructure, and the implementation and use of secure protocols, discuss procedures to secure organizational network architecture, transmission methods, and transport formats, control devices, to maintain the confidentiality, integrity, and availability of the information transmitted over communication networks, and discuss procedures to secure organizational network architecture, transmission methods, and transport formats, control devices, to maintain the confidentiality, integrity, and availability of the information transmitted over communication networks.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):