Read our cookies policy and privacy statement for more information.
×Denver, Colorado•
This course illustrates how information assets can be subjected to internal and external attacks and presents techniques used to secure them from unauthorized access. Topics include sub-networking for guest and vendor access; managing mixed operating system environments; data at rest and data in-transit; database inference; network management systems and security; information assurance tools and techniques.
Units: 3.0
Hours: 3 to 3