1. Investigation of core security technologies and security policies to mitigate risks.
2. Gain an understanding of network perimeter security design principles
3. Gain an understanding of free/ commercial security tools and their applications and develop the security solution for a given application/scenario.
4. Ability to review procedures for installation, troubleshooting, and monitoring of network devices to maintain integrity, confidentiality, and availability of data and devices.
5. Knowledge of the technologies that underpin the deployment and maintenance of a secure
network.
- Teacher: Ramesh Narwal