1 minute read
COURSE OVERVIEW
Description
This course focuses on information security, integrity and privacy techniques.Topics include the nature and challenges of computer security, the relationship between policy and security, the role and application of cryptography, the mechanisms used to implement policies, the methodologies and technologies for assurance and vulnerability analysis and intrusion detection
Outcomes
• It is designed to introduce the terminology, technology and its applications.
• Enable a clear understanding and knowledge of Security Analyst foundations, and introduce the tool, technologies and programming languages which is used in day today security analyst job role.
• Understand the difference between Security Metrics and Audits.
• Knowledge onVulnerability Management Knowledge
• Know the Information Security Audit Tasks, Reports and Post Auditing
• Understand Information Security Assessments Knowledge
Resources
• Assessing Information Security (strategies, tactics, logic and framework)
by A Vladimirov, K.Gavrilenko, and A.Michajlowski
• The Art of Computer Virus Research and Defense by Peter Szor.”
• Customized Labs to be purchased for practice