This discussion covers internal security from the perspective of guarding the intranet from:
- Malicious computers and devices|- Portable media attacks
- Data exfiltration by rogue personnel
- Addressing these issues requires a layered defense that starts with connecting to network access points for initial authentication. Defenses must form a continuous layer of protection through to each endpoint.
- This course offers 2 training hours of content in role based security training with Randy.
Learning Objectives
- Satisfy Annual Role Based Security Training Requirements
- Enhance awareness of IT and/or cyber security issues, threats and solutions.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Network Services
- Threat Analysis
- Vulnerability Assessment and Management