• Classroom
  • Online, Instructor-Led
Course Description

At the conclusion of this course, students will be able to do the following:

  1. Explain the concepts of information systems security as applied to an IT infrastructure.
  2. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  3. Explain the role of access controls in implementing a security policy.
  4. Explain the role of operations and administration in effective implementation of security policy.
  5. Explain the importance of security audits, testing, and monitoring to effective security policy.
  6. Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  7. Explain how businesses apply cryptography in maintaining information security.
  8. Analyze the importance of network principles and architecture to security operations.
  9. Explain the means attackers use to compromise systems and networks and defenses used by organizations.
  10. Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector.

Learning Objectives

Upon course completion, students should be able to explain the concepts of information systems security as applied to an IT infrastructure, describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure, explain the role of access controls in implementing a security policy, explain the role of operations and administration in effective implementation of security policy, explain the importance of security audits, testing, and monitoring to effective security policy, describe the principles of risk management, common response techniques, and issues related to recovery of IT systems, explain how businesses apply cryptography in maintaining information security, analyze the importance of network principles and architecture to security operations, explain the means attackers use to compromise systems and networks and defenses used by organizations, apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.