On course completion, you will be able to:
- Identify potent threats and vulnerabilities that may cause harm to a network or system
- Identify corrective measures for incident response
- Implement cryptographic standards and products
- Install, configure, and deploy network components, identity and access services (Identity & Access Management), and management controls
- Understand the principles of organizational security and the elements of effective security policies
- Implement secure network architecture concepts and systems design
- Describe how wireless and remote access security is enforced
- Identify risks and take corrective measures for risk mitigation and management
- Summarize application, coding vulnerabilities and identify development and deployment methods designed to mitigate them
- Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery