COURSE OVERVIEW
This Expert Track will provide you with a comprehensive knowledge of digital information security concepts and an understanding of their application. You’ll become an expert in the threats posed to organizations and the approaches needed to mitigate such threats.
The first course in this ExpertTrack covers the fundamentals of cyber security, the different types of cyber threat, and the development of an effective security policy. Once you have covered the basics, you’ll explore IT risk management and the techniques used to mitigate threats to an organization. You’ll consider security policies, security governance, and incident response strategies, learning how to apply different approaches to various real life cyber security breaches.
There will be an opportunity to unpack the basic principles of cryptography and analyze different encryption methods. Take the chance to explore the key principles of access control, password security, and biometrics, giving you an understanding of how access security breaches typically take place and what can be done to prevent them. You will also analyze relevant laws and regulations, including GDPR and the Computer Misuse Act (CMA), enabling you to work confidently within guidelines to uphold a high level of data security.
The final course in the ExpertTrack looks at the future of cyber security and threat management, taking into account the increased vulnerabilities of high technology systems. To complete your digital security training, you will critically discuss the sophistication of growing threats to organizations that conduct their business online and whether or not a bulletproof solution for these threats is possible.
COURSE OBJECTIVES
By the end of the ExpertTrack, you will be able to…
- Demonstrate an understanding of security concepts and protocols and their application to contemporary internet and mobile-based solutions and technologies
- Investigate the role of a security policy for protecting information assets, as well as demonstrate self-direction in designing security policies to defend those assets within the context of global communication and the web
- Perform a systematic digital risk assessment, identification and analysis in accordance with international standards and demonstrate an ability to deal with complex issues
- Demonstrate a systematic understanding of IT governance that relates to information security and how it influences the security policy of an organization
- Demonstrate a conceptual understanding of a wide range of current research and technological advances in cyber security and the ability to assess these
COURSE OUTLINE
- The Cyber Security Landscape
- Risk Management and Security Vulnerabilities
- Information Security and Management
- Cryptography and Digital certificates
- The future of Cyber Security and Emerging Technologies
KEY SKILLS YOU WILL LEARN
- Enterprise information security
- Risk management
- Risk assessment
- Cyber security
- Information security
- Digital security
- Security tools
- Network management
- Data management
Delivery Format
Online, In-country and Overseas
