• Online, Self-Paced
Course Description

Discover enterprise security architecture and examine integration of security controls for host devices to meet security requirements. In this course, you will learn how to implement trusted operating systems, explain least functionality, and describe endpoint security software. You will then review host-based IDS and IPS, and see how to harden host systems, wireless peripherals, and physical host peripherals. You will also examine scripting and replication, boot loader programs, terminal services, and application delivery services. Finally, you will see how to integrate controls for host devices.

Learning Objectives

{"implement trusted operating systems"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cyber Defense Analysis
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Threat Analysis