Discover enterprise security architecture and examine integration of security controls for host devices to meet security requirements. In this course, you will learn how to implement trusted operating systems, explain least functionality, and describe
Learning Objectives
Knowledge of host access control (HAC) systems and software
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):