• Online, Self-Paced
Course Description

After you have completed this course, you will understand the steps of a typical update process, describe how to protect update connections, explain how to protect the update server, list the steps to securely sign and verify an update, evaluate whether Secure Boot is necessary for your device at this time, and identify types of sensitive data that should not be included in updates.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Describe how to protect update connections
  • Explain how to protect the update server
  • List the steps to securely sign and verify an update
  • Evaluate whether Secure Boot is necessary at this time
  • Identify types of sensitive data that should not be included in updates

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.