In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.
Module 1: Managing Risk
Module 2: Integrating Computing, Communications, and Business Disciplines
Module 3: Using Research and Analysis to Secure the Enterprise
Module 4: Integrating Advanced Authentication and Authorization Techniques
Module 5: Implementing Cryptographic Techniques
Module 6: Implementing Security Controls for Hosts
Module 7: Implementing Security Controls for Enterprise Storage
Module 8: Analyzing and Implementing Network Security
Module 9: Implementing Security Controls for Applications
Module 10: Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
Module 11: Conducting Vulnerability Assessments
Module 12: Responding to and Recovering from Incidents
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.