This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.
This course can be applied to the following certificate:
Cybersecurity Certificate
Benefits and Learning Outcomes
- Understand the role of security operations and discuss its key themes
- Discuss several administrative controls and explain how they can improve information security
- Compare different security controls and explain how they work
- Identify trusted recovery techniques
- Relate the steps required in effective incident management and response
- Discuss the role of auditing, monitoring, and detection in information security
- Describe the steps involved in a digital forensics investigation