Managing Information Security

Loading...
icon

icon
Loading...
course-icon

Course

org-logo

Managing Information Security

Learn about Azure Security best practices. Understand the importance of enterprise threat detection monitoring and how to plan for a security incident.

Acquire critical skills in monitoring systems and applying controls in line with information security policies, procedures, and guidelines.

Self-Paced

Mentored

Beginner

time-icon

Duration

5 weeks, online
2hrs/week
fee-icon

From

$270 $270

Loading...

This course is designed to help you manage an enterprise security incident, while avoiding common errors. This approach will increase both the effectiveness and efficiency of your incident response efforts. Once you have completed this course, you will be able to build a Computer Security Incident Response Team (CSIRT) and understand the various tools required to achieve this.

During this course, you will be introduced to signature-based and behavioral/heuristic detection methods. You will explore the capabilities of on-premise threat detection and mitigation tools. You will develop an in-depth understanding of hybrid and cloud threat detection and mitigation tools. You will learn about the importance of enterprise threat detection monitoring. You will investigate the current nature of the security threat landscape. Plus, you will study the new security architecture and features of Microsofts Azure.

You will gain insights into Azure Security services with respect to securing services and data within Azure. You will build your knowledge of Azure security best practices. Plus, you will develop a firm understanding of the terminology, tools, and techniques for creating a secure resilient cloud services.

In addition, you will learn how to form a CSIRT and how to prepare a Security Incident Report.

This FutureSkills Prime course comprises three purposely designed modules that take you on a carefully defined learning journey.

It is a self-paced course, which means it is not run to a fixed schedule with regard to completing modules or submitting assignments. To give you an idea of how long the course takes to complete, it is anticipated that if you work 2 hours per week, you will complete the course in 5 weeks. However, as long as the course is completed by the end of your enrollment, you can work at your own pace. And dont worry, youre not alone! You will be encouraged to stay connected with your learning community and mentors through the course discussion space.

The materials for each module are accessible from the start of the course and will remain available for the duration of your enrollment. Methods of learning and assessment will include videos, reading material, and online exam questions.

As part of our mentoring service you will have access to valuable guidance and support throughout the course. We provide a dedicated discussion space where you can ask questions, chat with your peers, and resolve issues. Depending on the payment plan you have chosen, you may also have access to live classes and webinars, which are an excellent opportunity to discuss problems with your mentor and ask questions. Mentoring services will vary across packages.

Once you have successfully completed the course, you will earn your FutureSkills Prime Certificate of Participation. You will also receive a Certificate of Completion from SkillUp Online.

After completing this course students will have the ability to:

  • Describe signature-based and behavioral/heuristic detection methods.
  • List the capabilities of on-premise threat detection and mitigation tools.
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools.
  • Recognize the importance of Enterprise threat detection monitoring.
  • Understand the current nature of the security threat landscape and study the new security architecture and features of Microsofts Azure.
  • Understand Azure Security services to help secure your services and data within Azure.
  • Understand Azure Security best practices.
  • Understand the terminology, tools, and techniques for creating a secure resilient cloud services.

  • Individuals who want to learn about building a CSIRT.
  • Individuals who want to learn about Security Incidence Response and disaster recovery.
  • Individuals who want to learn about threat detection in an enterprise and various aspects such as penetration testing, posture testing etc.
  • Individuals who want to learn about threat detection using Microsoft Cloud App Security and Office 365 Cloud App Security.
  • Individuals who want to know about the Azure Security architecture.

In addition to their professional experience, students who take this training should already have technical knowledge in the following:

  • The current cybersecurity ecosystem.
  • Analysis of hacks on computers and networks.
  • Basic risk management.

This course is aligned with industry-approved occupational standards set by SSC NASSCOM. Once youve successfully completed this course, you will receive a cobranded FutureSkills Prime/SkillUp Online Certificate of Participation that confirms you have:

  • Job-ready competencies
  • Practical experience
  • Assessed technical knowledge

The national occupational standards to which this course is aligned relate to the following job roles:

  • Security Analyst