Page 12 - PowerPoint Presentation
P. 12
About the Course
Course Description:
This course deals with the introduction to major areas of system security, security threats,
authentication, different attacks, malicious code, remote access, and email and web security.
Course Goals / Objectives:
After completing this course, the students must be able to:
1. describe the importance of security governance, management concepts, and
principle;
2. describe the importance of taking users into account when designing and deploying
security solution and how to implement it;
3. state the laws that govern security issues such as computer crime, intellectual
property, data privacy, and software licensing;
4. describe the importance of data classifications;
5. design and validate assessment and test strategies
6. discuss resource protection, configuration management, and patch and vulnerability
management controls
7. discuss disasters that affects an organization and how to handle them
Course Content:
1. Security and Risk Management (Part 1)
- Security Governance Through Principles and Policies
2. Security and Risk Management (Part 2)
- Personnel Security and Risk Management Concepts
3. Security and Risk Management (Part 3)
- Laws, Regulations, and Compliance
4. Asset Security
a. Classifying and Labeling Assets
b. Identifying Data Roles
c. Protecting Privacy
5. Security Assessment and Testing
a. Building a Security Assessment and Testing Program
b. Performing Vulnerability Assessments
c. Testing your Software
d. Implementing Security Management Process
6. Security Operations (Part I)
a. Managing Security Operations
b. Preventing and Responding to Incidents
7. Security Operations (Part II)
a. Disaster Recovery Planning
b. Incidents and Ethics
c. Honor Students
ITEC106 – Systems Security Mr. John Mark L. Dula