New Security Operations

JUMP TO REGISTER

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

This course can be applied to the following certificate:
Cybersecurity Certificate

Benefits and Learning Outcomes

  • Understand the role of security operations and discuss its key themes
  • Discuss several administrative controls and explain how they can improve information security
  • Compare different security controls and explain how they work
  • Identify trusted recovery techniques
  • Relate the steps required in effective incident management and response
  • Discuss the role of auditing, monitoring, and detection in information security
  • Describe the steps involved in a digital forensics investigation

Instructor

Online Expert Instruction

This course has an “Ask the Expert” feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible, usually within 24 hours. read more