Information Security Audits

Loading...
icon

icon
Loading...
course-icon

Course

org-logo

Information Security Audits

Gain the necessary skills for creating an Incident Response Plan. Discover how to establish route monitoring and review network traffic and system performance. Learn to determine the vulnerabilities in an environment and identify compromised systems.

Build valuable job-aligned skills for the role of a security analyst.

Self-Paced

Mentored

Beginner

time-icon

Duration

3 weeks, online
2 hours/week
fee-icon

From

$270 $270

Loading...

This course is designed to help organizations manage an enterprise security incident, while avoiding common errors.

During this course, you will learn about security incident response strategies. You will investigate how to effectively prioritize the response to a security incident. You will learn how to build a Computer Security Incident Response Team (CSIRT) and develop an incident response action plan based on audits. In addition, you will learn about threat modelling using the NIST Framework and how to prepare a Security Incident Report.

Once you have completed this course, you will have a good understanding of what comprises a Computer Security Incident Response Team (CSIRT) and how to prioritize actions for a security incident response. You will also be able to manage post-incident activity to prevent recurrence.


This FutureSkills Prime course comprises four purposely designed modules that take you on a carefully defined learning journey.

It is a self-paced course, which means it is not run to a fixed schedule with regard to completing modules or submitting assignments. To give you an idea of how long the course takes to complete, it is anticipated that if you work 2 hours per week, you will complete the course in 3 weeks. However, as long as the course is completed by the end of your enrollment, you can work at your own pace. And don’t worry, you’re not alone! You will be encouraged to stay connected with your learning community and mentors through the course discussion space.

The materials for each module are accessible from the start of the course and will remain available for the duration of your enrollment. Methods of learning and assessment will include videos, reading material, and online exam questions.

As part of our mentoring service you will have access to valuable guidance and support throughout the course. We provide a dedicated discussion space where you can ask questions, chat with your peers, and resolve issues. Depending on the payment plan you have chosen, you may also have access to live classes and webinars, which are an excellent opportunity to discuss problems with your mentor and ask questions. Mentoring services will vary across packages.

Once you have successfully completed the course, you will earn your Certificate of Completion.


After completing this course, you will be able to:
  • Effectively prioritize the response to a security incident.
  • Build a Computer Security Incident Response Team (CSIRT).
  • Develop an incident response action plan.
  • Carry out post-incident activity.

  • Individuals keen to learn about security incident response strategies.
  • Organizations keen to develop robust threat modelling and an effective incident response.

  • Learners should already have technical knowledge of the following:

  • The current cybersecurity ecosystem.
  • Analysis of hacks on computers and networks.
  • Basic risk management.

  • This course is aligned with industry-approved occupational standards set by SSC NASSCOM. Once youve successfully completed this course, you will receive a Certificate of Completion that confirms you have:

  • Job-ready competencies
  • Practical experience
  • The national occupational standards to which this course is aligned relate to the following job roles:
  • Security Analyst