Description
Systems Administration (IO-WRL-005)
Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.
Each component of this course is directly the related to the OPM 451
This course covers all of 79 knowledge statements using recorded sessions with corresponding readings, mindmaps and glossaries. Each session has up to four knowledge confirming quizzes.
It can be done as independent study with continual daily support from a live subject matter expert.
If you choose to do it as a part of a cohort of students: there are weekly scheduled live content Q&A’s.
This is part 1 of a full work role for Systems Administration.
Topic of the course:
Performance Tuning Tools and Techniques
Standard Operating Procedures
Computer Networking Protocols
Risk Management Processes
Cybersecurity Laws and Regulations
Cybersecurity Policies and Procedures
Privacy Laws and Regulations
Privacy Policies and Procedures
Cybersecurity Principles and Practices
Privacy Principles and Practices
Cybersecurity Threats
Cybersecurity Vulnerabilities
Cybersecurity Threat Characteristics
Access Control Principles and Practices
Authentication and Authorization Tools and Techniques
Enterprise Cybersecurity Architecture Principles and Practices
Local Area Networks
Wide Area Networks
Host Access Control Systems and Software
Network Access Control Systems and Software
Confidentiality, Integrity and Availability Principles and Practices
Non-Repudiation Principles and Practices
Cyber Safety Principles and Practices
Systems Security Engineering Principles and Practices
Information Technology Security Principles and Practices
Bandwidth Management Tools and Techniques
System Performance Indicators
System Availability Measures
Operating System Systems and Software
Policy-Based Access Controls
Risk Adaptive Access Controls
Process Engineering Principles and Practices
System Threats
System Vulnerabilities
Server Administration Principles and Practices
Client and Server Architecture
Server Diagnostic Tools and Techniques
Fault Detection and Diagnostics Tools and Techniques
Software Engineering Principles and Practices
System Administration Principles and Practices
Enterprise Information Technology Architecture Principles and Practices
Systems Engineering Processes
Hardware Maintenance Policies and Procedures
Virtual Private Network Systems and Software
Defense-In-Depth Principles and Practices
Network Configurations
File System Implementation Principles and Practices
Command-Line Tools and Techniques
Machine Virtualization Tools and Techniques
Account Creation Policies and Procedures
Password Policies and Procedures
Hardening Tools and Techniques
Hardware Reverse Engineering Tools and Techniques
Software Reverse Engineering Tools and Techniques
Reverse Engineering Principles and Practices
Virtual Machine Detection Tools and Techniques
Encryption Tools and Techniques
Enterprise Architecture Reference Models and Frameworks
Enterprise Architecture Principles and Practices
Application Firewall Principles and Practices
Network Firewall Principles and Practices
The Open Systems Interconnect Reference Model
Network Architecture Principles and Practices
Personally Identifiable Information Data Security Standards and Best Practices
Payment Card Industry Data Security Standards and Best Practices
Personal Health Information Data Security Standards and Best Practices
Wireless Communication Tools and Techniques
Signal Jamming Tools and Techniques
Systems Engineering Principles and Practices
Incident, Event, and Problem Management Policies and Procedures
Incident Reporting Policies and Procedures
Computer Engineering Principles and Practices
System Integration Principles and Practices
Computer Networking Principles and Practices
Network Security Principles and Practices
Virtual Machine Tools and Technologies
Automated Security Control Testing Tools and Techniques
Organizational Policies and Procedures
Systems Administration Standard Operating Policies and Procedures





