CSC 240 - Security Operations, Assessment and Testing
Course Description
Protecting critical data is essential when dealing with sensitive material. Security audits and assessments are used to perform oversight and identify the effectiveness of security controls, and concepts about security operations (SecOps). You will learn how to design and validate security assessments, test and audit strategies, conduct security control testing and facilitate security audits.
Students will explore critical topics in SecOps, including the physical security of data and operational facilities, incident response, conducting investigations, handling material and evidence, digital forensics, disaster recovery processes, and business continuity planning.
This course covers the following domains of the CISSP Common Body of Knowledge:
- Domain Six: Security Assessment and Testing
- Domain Seven: Security Operations
Course Details
Course Learning Outcomes
By the completion of this course, successful learners will be able to:
- Demonstrate knowledge in the design and validation of security assessment, test and audit strategies, and security control testing
- Collect security process data and generate a report
- Describe and apply security investigation processes, logging and monitoring activities, Configuration Management (CM), incident management, and change management processes
- Demonstrate knowledge in foundational security operations concepts, resource protection, detective and preventive measures, patch and vulnerability management, and physical security
- Explain and apply recovery strategies, Disaster Recovery (DR) processes, Disaster Recovery Plans (DRP), and Business Continuity (BC) planning
Topics
- Security Assessments
- Test, assessment, and audit strategies
- Testing technical security controls
- Conducting or facilitating security audits
- Measuring Security
- Security metrics
- Security process data
- Reporting
- Management review and approval
- Managing Security Operations
- Foundational security operations concepts
- Change management processes
- Configuration management
- Resource protection
- Patch and vulnerability management
- Physical security management
- Personnel safety and security
- Security Operations
- Security operations center (SOC)
- Preventive and detective measures
- Logging and monitoring
- Security Incidents
- Incident management
- Incident response planning
- Investigations
- Disasters
- Recovery strategies
- Disaster recovery processes
- Testing disaster recovery plans
- Business continuity
Who is this course for?
This course will help you to acquire the knowledge covered in the following domains of the CISSP CBK:
- Domain Six: Security Assessment and Testing
- Domain Seven: Security Operations
Individuals in different roles and at various stages in their careers can benefit from this course. The course is designed for:
- Recent graduates (degree, associate degree, diploma) in IT or Computer Science who plan to challenge the CISSP exams to become Associate of (ISC)2
- Experienced IT professionals who are keen to move up the career ladder entering senior positions (e.g. manager, director, senior specialist, chief information security officer)
- Individuals who want to learn the technical skills to a career change into cyber security or information security
- IT infrastructure or Cyber Security professionals looking to upskill and learn new in-demand skills
Prerequisites
There are no mandatory prerequisites for this course. However, you are required to perform a self-assessment to ensure you meet the requirements to enrol.
Self-assessment for enrolment
Recent graduates (degree, associate degree, or diploma) in IT / Computer Science or related field
OR
At least 2 years of working experience in IT infrastructure or Cybersecurity
OR
Recommended prerequisites
Applies Towards the Following Program(s)
- Information Systems Security : Required