This is a 3-part course and training will be given in the following areas:
- trusted computer base,
- protection mechanisms,
- access modes,
- identification and authorisation,
- security protocols,
- hash functions,
- message authentication codes,
- x509 certificates,
- Kerberos,
- mobile device security,
- wireless networks,
- adhoc networks.
Contact us for course dates and prices.
[wpforms id=”143″ title=”true”]