National CAE Designated Institution
  • Online, Instructor-Led
Course Description

The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.

Learning Objectives

The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.