This course emphasizes the need for management and technology to successfully implement an information security program in an organization. Threats, attacks, legal and ethical issues, risk assessment and control strategies; planning, development, and maintenance of security policies; contingency planning; firewalls, intrusion detection systems and security tools; and management of information security are some of the topics covered in this course.
Learning Objectives
N/A
Framework Connections
Competency Areas
Work Roles
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.