Read our cookies policy and privacy statement for more information.
×Sacramento, California•
With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. The firewall has emerged as a primary tool used to prevent unauthorized access. Students will learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall Virtual Private Networks (VPNs).
Units: 3.0
Hours: 48 hours LEC; 18 hours LAB