Operational and Organizational Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
To present the key issues and policy requirements for organizational and operational security

Target Audience
Network administrators, firewall administrators, system administrators, application developers, and IT security officers

Prerequisites
Knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams

Expected Duration (hours)
6.0

Lesson Objectives

Operational and Organizational Security

  • discuss the reason for business continuity plans.
  • discuss the reason for and the process involved in creating a disaster recovery plan.
  • discuss the reasons why business continuity plans are used and how to create them.
  • describe how to develop a business impact assessment and a business continuity plan.
  • discuss the process involved in maintaining and testing a disaster recovery plan.
  • explain the underlying concepts and principles of security management.
  • list and explain the recognized industry standards and recommendations that address information and network security.
  • define security policy and identify issue-specific security policy documents.
  • design a security policy document.
  • discuss employment practices in the workplace.
  • describe the controls that are available to protect resources, restrict privileges, and limit the risk of access abuse in a network environment.
  • describe the technologies and controls that make a working environment secure.
  • describe the technologies and controls that make a safe working environment.
  • identify the environmental safeguards and security strategies required to make a site secure.
  • describe the technologies and controls that restrict access to a working environment and control data confidentiality.
  • discuss risk management and its requirements with reference to security issues.
  • describe the processes involved in implementing information risk management.
  • explain how computer crime investigations are conducted.
  • Course Number:
    84873_eng