Covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.
- Network Security
- Compliance and Operational Security
- Threats and Vulnerabilities
- Explain the importance of application security
- Access Control and Identity Management
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.