1 minute read

COURSE OVERVIEW

Description

This course focuses on information security, integrity and privacy techniques.Topics include the nature and challenges of computer security, the relationship between policy and security, the role and application of cryptography, the mechanisms used to implement policies, the methodologies and technologies for assurance and vulnerability analysis and intrusion detection

Outcomes

• It is designed to introduce the terminology, technology and its applications.

• Enable a clear understanding and knowledge of Security Analyst foundations, and introduce the tool, technologies and programming languages which is used in day today security analyst job role.

• Understand the difference between Security Metrics and Audits.

• Knowledge onVulnerability Management Knowledge

• Know the Information Security Audit Tasks, Reports and Post Auditing

• Understand Information Security Assessments Knowledge

Resources

• Assessing Information Security (strategies, tactics, logic and framework)

by A Vladimirov, K.Gavrilenko, and A.Michajlowski

• The Art of Computer Virus Research and Defense by Peter Szor.”

• Customized Labs to be purchased for practice

This article is from: