Full course description
This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.
Learning Outcomes:
- Understand the role of security operations and discuss its key themes
- Discuss several administrative controls and explain how they can improve information security
- Compare different security controls and explain how they work
- Identify trusted recovery techniques
- Relate the steps required in effective incident management and response
- Discuss the role of auditing, monitoring, and detection in information security
- Describe the steps involved in a digital forensics investigation
Credentials:
PMI PDUs: 5Leadership PDUs: 1Strategic & Business Management PDUs: 1.5Technical PM PDUs: 2.5IACET CEUs: .5 (Contact Hours: 5 hours)HRCI Credits: 5 (Type: Specified - Strategic Business)SHRM PDCs: 5