• Online, Self-Paced
Course Description

IT systems can be exploited from both external and internal sources. Discover how to monitor and analyze various types of systems for auditing and security purposes.

Learning Objectives

{"recognize the importance of continuous monitoring of various systems"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cyber Defense Analysis
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Threat Analysis