Security Operations and Administration
Security operations and administration is the task of identifying an organization’s information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information.The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties.
Course Objectives
- Define Code of Ethics
- Describe the security concepts
- Document and operate security controls
- Describe the asset management process
- Implement compliance controls
- Assess compliance controls
- Describe the change management process
- Contribute to the security awareness training program
- Contribute to physical security operations
None
Syllabus
Syllabus - What you will learn from this course
Week 1
Understand and Comply with Code of Ethics and Security Concepts
Week 2
Participate in Asset Management
Week 3
Implement and Assess Compliance with Controls & Participate in Change Management Duties
Week 4
Participate in Physical Security Operations & Security Awareness Training
Week 5
Case Study
Week 6
Exam
FAQ
Can I preview a course before enrolling?
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
What will I get when I enroll?
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
When will I receive my Course Certificate?
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
Why can’t I audit this course?
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
How long does it take to complete the course?
The course schedule contains approximately 16 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.
Reviews
It s a brilliant course comprised of minute details in small packet and learners will get a complete overview of the systems.
Highly Recommended.
Informative, challenges you to contemplate practical application of security concepts
Covers everything the young IT security professional should know - Masterfully compiled and presented.
Im glade to be on of coursear student I have learned a lot of things and thanks for all the experience you gave us much appreciated