Implementation
Description
Program Objectives
- Given a scenario, implement secure protocols
- Given a scenario, implement host or application security solutions
- Given a scenario, implement secure network designs
- Given a scenario, install and configure wireless security settings.
- Given a scenario, implement secure mobile solutions
- Given a scenario, apply cybersecurity solutions to the cloud.
- Given a scenario, implement identity and account management controls.
- Given a scenario, implement authentication and authorization solutions.
- Given s scenario, implement public key infrastructure.
Topics for this course
11 Lessons
Implementation
Program Objectives
Given a scenario, implement secure protocols
Given a scenario, implement host or application security solutions
Given a scenario, implement secure network designs
Given a scenario, install and configure wireless security settings.
Given a scenario, implement secure mobile solutions
Given a scenario, apply cybersecurity solutions to the cloud.
Given a scenario, implement identity and account management controls.
Given a scenario, implement authentication and authorization solutions.
Given s scenario, implement public key infrastructure.