• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.

Learning Objectives

  • Module 1: Managing Risk
  • Module 2: Integrating Computing, Communications, and Business Disciplines
  • Module 3: Using Research and Analysis to Secure the Enterprise
  • Module 4: Integrating Advanced Authentication and Authorization Techniques
  • Module 5: Implementing Cryptographic Techniques
  • Module 6: Implementing Security Controls for Hosts
  • Module 7: Implementing Security Controls for Enterprise Storage
  • Module 8: Analyzing and Implementing Network Security
  • Module 9: Implementing Security Controls for Applications
  • Module 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
  • Module 11: Conducting Vulnerability Assessments
  • Module 12: Responding to and Recovering from Incidents

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.