Course Overview
Learning Objectives
- Implement and troubleshoot security configurations on a network using common devices, protocols, and services
- Explain and document risk mitigation strategies, forensic procedures, and risk management best practices in support of compliance and operational security
- Identify and explain security threats and appropriate defenses for malware, social engineering attacks, wireless attacks, and application attacks
- Outline security procedures to maintain application security, host security, and data security
- Install and configure authentication, identification, authorization, or access control
- Identify and use standard cryptography methods and certificate management
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):