This course will provide the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The participant will perform these tasks to support the principles of confidentiality, integrity, and availability.
The participant will also have the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.
“This program is the best especially for working adults. The blend of knowledge, experience base and theories was indeed very helpful to assist a successful application.”
“I learned a lot from this program, not to mention the dedication shown by my learned lecturers, who have imparted valuable knowledge and insights.”
It was really an eye opening for me. Even though I am not exposed deeply in this industry before, the learning process have created a huge impact and I learned a lot from the experienced people in this industry.”
PEOPLElogy assists your organization in identifying and capitalizing on its most valuable asset – its employees. Our winning 3D formula of discovery, development, and digitalization will help transform your team into a workforce to be reckoned with.
Scroll to top