• Online, Self-Paced
Course Description

This discussion covers internal security from the perspective of guarding the intranet from:

  • Malicious computers and devices|- Portable media attacks
  • Data exfiltration by rogue personnel
  • Addressing these issues requires a layered defense that starts with connecting to network access points for initial authentication. Defenses must form a continuous layer of protection through to each endpoint.
  • This course offers 2 training hours of content in role based security training with Randy.

Learning Objectives

  1. Satisfy Annual Role Based Security Training Requirements
  2. Enhance awareness of IT and/or cyber security issues, threats and solutions.

Framework Connections