Leadership Development
Technology & Data Science
Computer Applications
Cybersecurity & CISSP
Data Management & Analytics
Emerging Technologies
Web Design
Project Management
Organizational Effectiveness
Essential Business Functions
Innovation & Entrepreneurship
Personal Development
Teaching & Learning
Events & Community

Security Operations
Course Description
Provides a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.
Learning Outcomes
After completing this course, the learner should be able to:
- Understand the role of security operations and discuss its key themes
- Discuss several administrative controls and explain how they can improve information security*
- Compare different security controls and explain how they work
- Identify trusted recovery techniques
- Relate the steps required in effective incident management and response
- Discuss the role of auditing, monitoring, and detection in information security
- Describe the steps involved in a digital forensics investigation