ISIS-3422 TOP DOWN NETWORK SECURITY

Students in this course learn in a Top-Down schema the implementation of IT security policies for the enterprise. The course starts with an overview of the most important IT security rules in order to explain how to do a GAP analysis and then learn to define policies.

Credits

3