top of page
Certificate in System Security
About the Course
The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.
Course Modules
MODULE 1
MODULE 2
MODULE 3
MODULE 4
MODULE 5
MODULE 6
MODULE 1
MODULE 7
MODULE 8
MODULE 9
MODULE 10
Your Instructor
IT Trainer responsibilities include identifying educational needs, designing educational material and ensuring all employees take basic computer training. If you know how to design engaging courses to explain technical procedures and best practices, we'd like to meet you.
Proceed for Admission
bottom of page