51ÁÔÆæ

Security Operations

JUMP TO REGISTER

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

This course can be applied to the following certificate:
Cybersecurity Certificate

Benefits and Learning Outcomes

  • Understand the role of security operations and discuss its key themes
  • Discuss several administrative controls and explain how they can improve information security
  • Compare different security controls and explain how they work
  • Identify trusted recovery techniques
  • Relate the steps required in effective incident management and response
  • Discuss the role of auditing, monitoring, and detection in information security
  • Describe the steps involved in a digital forensics investigation