• Online, Self-Paced
Course Description

Organizations are subject to increasingly sophisticated network attacks that are occurring more and more frequently. And despite significant improvements in IT security, hackers and attackers are still able to exploit weaknesses in some computer networks - potentially resulting in major data breaches.

In this course, you'll learn about the importance of defense in stopping hackers from accessing vital customer or business data. you'll discover the different types of computer network security threats to your organization, how these threats can be prevented, and how they can be detected if one breaches your computer security system.

Learning Objectives

Organizations are subject to increasingly sophisticated network attacks that are occurring more and more frequently. And despite significant improvements in IT security, hackers and attackers are still able to exploit weaknesses in some computer networks - potentially resulting in major data breaches.

In this course, you'll learn about the importance of defense in stopping hackers from accessing vital customer or business data. you'll discover the different types of computer network security threats to your organization, how these threats can be prevented, and how they can be detected if one breaches your computer security system.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Systems Architecture