Program Objectives
- Given a scenario, implement secure protocols
- Given a scenario, implement host or application security solutions
- Given a scenario, implement secure network designs
- Given a scenario, install and configure wireless security settings.
- Given a scenario, implement secure mobile solutions
- Given a scenario, apply cybersecurity solutions to the cloud.
- Given a scenario, implement identity and account management controls.
- Given a scenario, implement authentication and authorization solutions.
- Given s scenario, implement public key infrastructure.
Course Features
- Lectures 11
- Quizzes 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 345
- Certificate Yes
- Assessments Yes
Curriculum
- 1 Section
- 11 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Implementation11
- 1.1Given a scenario, implement secure protocols52 Minutes
- 1.2Given a scenario, implement host or application security solutions53 Minutes
- 1.3Given a scenario, implement secure network designs Part-158 Minutes
- 1.4Given a scenario, install and configure wireless security settings.53 Minutes
- 1.5Given a scenario, implement secure mobile solutions Part-138 Minutes
- 1.6Given a scenario, implement secure mobile solutions Part-220 Minutes
- 1.7Given a scenario, apply cybersecurity solutions to the cloud.37 Minutes
- 1.8Given a scenario, implement identity and account management controls.23 Minutes
- 1.9Given a scenario, implement authentication and authorization solutions.53 Minutes
- 1.10Given a scenario, implement secure network designs Part-221 Minutes
- 1.11Given a scenario, implement public key infrastructure.35 Minutes
345 students enrolled.