- 0
- 16 weeks long
- Independent
- English
Course Overview
Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.
Upon completion of this course, a student will be able to:
- Compare security technologies including encryption, storage, and transmission methods
- Evaluate social and political arguments relating to information security and privacy
- Engage in healthy and constructive debates that include both technical and political issues around security
Course Circullum
- Becoming a CISM
- Information Security Governance
- Information Risk Management
- Information Security Program Development and Management
- Information Security Incident Management
Item Reviews - 3
Submit Reviews
This Course Include:
- Becoming a CISM
- Information Security Governance
- Information Risk Management
- Information Security Program Development and Management
- Information Security Incident Management
- Provider:Independent
- Certificate:Not Avalible
- Language:English
- Duration:16 weeks long
- Language CC: