Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. Performing these tasks properly and in alignment with industry best practices is critical to virtually every technology role, from decision maker to developer to operator.
This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. CISSP is widely regarded as the most valuable vendor-neutral credential a computer security professional can hold. It is frequently identified as a prerequisite for security jobs across all industries including security design, implementation, maintenance, policy development, and management of secured systems, process/procedures, policies, applications and networks.
After completing this course, you will have an understanding of:
- Security Architecture and Design
- Implementing Governance Compliance Strategies and Risk Management
- Security Access Control models, methods and implementations.
- Disaster Recovery Planning
- Cryptography Methodology
- Operations in Information Security
- Legal, Regulations, Investigations and Compliance in Security
- Vulnerability Assessment
- Continuous Security Lifecycle
- Physical and Software Development Security
- Network Security Considerations