Security Operations

The key to ensuring secure IT infrastructure is a trained security team who can quickly identify and mitigate threats and vulnerabilities. Security operations professionals must be able to ensure security throughout an asset’s life-cycle from initial design to decommissioning and disposal.

Course Outline

  • Provisioning of Resources
  • Resource Protection Techniques
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Physical Security
  • Incident Management
  • Logging and Monitoring
  • Investigations Support and Requirements
  • Personnel Safety Concerns
  • Preventative Measures
  • Patch and Vulnerability Management
  • Business Continuity Planning and Exercises