The key to ensuring secure IT infrastructure is a trained security team who can quickly identify and mitigate threats and vulnerabilities. Security operations professionals must be able to ensure security throughout an asset’s life-cycle from initial design to decommissioning and disposal.
Course Outline
- Provisioning of Resources
- Resource Protection Techniques
- Recovery Strategies
- Disaster Recovery Processes and Plans
- Physical Security
- Incident Management
- Logging and Monitoring
- Investigations Support and Requirements
- Personnel Safety Concerns
- Preventative Measures
- Patch and Vulnerability Management
- Business Continuity Planning and Exercises