X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 3 / 158

393 views

0 shares

0 downloads

0 comments

3 / 158

U.S. Department of Health and Human Services

Course overview

How you integrate security into your role as an IT Administrator makes an important difference in how well HHS performs its mission. This course is organized as follows:

Security Compliance of Your System - Laws, HHS policies, and other guidance you need to observe.

Systems Analysis and Boundaries - Boundaries, features, and interconnectivity of systems, the System Development Life Cycle, and related security practices.

Security Controls and Your System – National Institute of Standards and Technology (NIST) recommendations and HHS practices implementing security controls.

Documentation, Testing and Authorization- Where security practices fit in each of these tasks.

IT Administrators and Secure Systems - Security issues most likely to concern IT Administrators.

Page 2 of 2

Document info
Document views393
Page views393
Page last viewedMon Dec 05 19:13:08 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments