Description
This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.
credits
- PMI PDUs: 5
- Leadership PDUs: 1
- Strategic & Business Management PDUs: 1.5
- Technical PM PDUs: 2.5
- IACET CEUs: 0.5
- HRCI Credits: 5
- SHRM PDCs: 5
features
- Mobile-friendly
- Audio-enabled
- Badge and credit-awarding
- Real-world case studies
- Fully accessible
- Games & Flashcards
- Expert-supported
- Video content
learning Outcomes
- Understand the role of security operations and discuss its key themes
- Discuss several administrative controls and explain how they can improve information security
- Compare different security controls and explain how they work
- Identify trusted recovery techniques
- Relate the steps required in effective incident management and response
- Discuss the role of auditing, monitoring, and detection in information security
- Describe the steps involved in a digital forensics investigation