This course is designed to provide students with the knowledge and skills required to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. Students will perform these tasks to support the principles of confidentiality, integrity and availability.
Identify threats, attacks and vulnerabilities.
Implement security technologies and tools.
Design security architecture.
Implement identity and access management techniques.
Understand risk management.
Apply cryptography and public key infrastructure (PKI).