Page 12 - PowerPoint Presentation
P. 12

About the Course

               Course Description:
               This course deals with the introduction to major areas of system security, security threats,
               authentication, different attacks, malicious code, remote access, and email and web security.

               Course Goals / Objectives:
               After completing this course, the students must be able to:
                   1.  describe the importance of security governance, management concepts, and
                       principle;
                   2.  describe the importance of taking users into account when designing and deploying
                       security solution and how to implement it;
                   3.  state the laws that govern security issues such as computer crime, intellectual
                       property, data privacy, and software licensing;
                   4.  describe the importance of data classifications;
                   5.  design and validate assessment and test strategies
                   6.  discuss resource protection, configuration management, and patch and vulnerability
                       management controls
                   7.  discuss disasters that affects an organization and how to handle them

               Course Content:
                   1.  Security and Risk Management (Part 1)
                                     - Security Governance Through Principles and Policies
                   2.  Security and Risk Management (Part 2)
                                     - Personnel Security and Risk Management Concepts
                   3.  Security and Risk Management (Part 3)
                                     - Laws, Regulations, and Compliance
                   4.  Asset Security
                       a.  Classifying and Labeling Assets
                       b.  Identifying Data Roles
                       c.  Protecting Privacy
                   5.  Security Assessment and Testing
                       a. Building a Security Assessment and Testing Program
                       b. Performing Vulnerability Assessments
                       c. Testing your Software
                       d.  Implementing Security Management Process
                   6.  Security Operations (Part I)
                       a.  Managing Security Operations
                       b.  Preventing and Responding to Incidents
                   7.  Security Operations (Part II)
                       a.  Disaster Recovery Planning
                       b.  Incidents and Ethics
                       c.  Honor Students






               ITEC106 – Systems Security                                       Mr. John Mark L. Dula
   7   8   9   10   11   12   13   14   15   16   17