This course is designed to Identify security access control and operating systems requirements and configuration standards. After that, the training will focus on each of the following points:
- Use and operate access control and security operating system functionalities as per the set protocols and guidelines.
- Assist end-users by providing technical support and rectifying simple troubleshoots.
- Provide recommendations and system functional requirements to enhance the security systems and tools.