About Course
At the end of this course, participants should be able to:
- Install, configure, and manage network security controls and devices
- Design, implement, and monitor security policies
- Harden hosts to secure them against intrusions
- Implement and configure VNPs and wireless network technologies
- Perform risk, threat, and vulnerability assessments