Security Operations

Description

An organization endeavours to secure its Information Technology Architecture against threats. Secure Operations Management ensures the elements of this architecture, Network, Operating Systems and Server Technology are configured and secured correctly and compliant with relevant frameworks. Implementing robust defences is the best method to mitigate against threats. Preparedness for an incident is as important as incident response.

Learning Outcomes

  1. Critically evaluate design and implement the planning, scoping and reconnaissance phases associated with penetration testing.

  2. Critically evaluate exisitng tools and techniques and develop new best practices for Vulnerability Management and Endpoint Protection.

  3. Analyse and document measures, concepts and methods that apply to Security Governance, Strategic Planning and Organizational Structure.

  4. Desgin and implement appropriate measures and controls that an organisation can deploy to harden devices, networks and operating systems against threats.

  5. Conduct appropriate research and undertake the design and development of appropriate measures and controls that an organisation can deploy to improve threat mitigation capabilities and ensure compliance with relevant frameworks.

Credits
10
% Coursework 100%