Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. DeVry University
  4. Cybersecurity Career Preparation

Cybersecurity Career Preparation

This course reviews and reinforces knowledge and skills needed to implement, monitor and administer IT infrastructure using cybersecurity best practices. Cyber industry topics covered include security operations and administration; access controls; risk identification, monitoring and analysis; incident response and recovery; cryptography; network and communications security; and systems and application security.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
SEC399
Course Prerequisites

SEC290

Training Purpose
Functional Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Location

4225 Naperville Road, Suite 400
Lisle, IL 60532

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led

Learning Objectives

  • Students learn to identify organizational information assets, and discuss the process to document policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability, demonstrate the underlying principles of access control systems and how to implement, manage and secure those systems, including internetwork trust architectures, federated identity management, identity management lifecycle, and various access, identify, evaluate, and prioritize organizational potential threats, and demonstrate the robust application of resources to monitor, manage, and mitigate those threats, evaluate and conduct risk management concepts, assessment activities, and monitoring terminology, techniques, and systems to mitigate information security risks within the organization, discuss effective incident handling processes and procedures to facilitate efficient and effective processes in addressing security incidents, supporting forensic investigations, business continuity planning (BCP), and disaster recovery planning (DRP), demonstrate the understanding of organizational cryptographic concepts, methodologies, and technologies; as it applies in the legal and regulatory requirements, key management concepts, public key infrastructure, and the implementation and use of secure protocols, discuss procedures to secure organizational network architecture, transmission methods, and transport formats, control devices, to maintain the confidentiality, integrity, and availability of the information transmitted over communication networks, and discuss procedures to secure organizational network architecture, transmission methods, and transport formats, control devices, to maintain the confidentiality, integrity, and availability of the information transmitted over communication networks.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: