IT Risk Management and Disaster Recovery
Learning Outcomes
On successful completion of this Course, students will be able to: Analyse the nature of information security and the risk involved; Propose the necessary mitigations for probable security events; Evaluate results of computer forensics for security risk management; To propose disaster recovery methods to recover from security attacks; To propose business continuity plan that can mitigate the IT infra structure disruptions.
Topics
- Risk Management – Contingency Planning Within Information Security
- Risk Management – Planning For Organizational Readiness
- Technical aspect of Information Security
- Network Risk – Intrusion
- Network Risk Mitigation – Intrusion Detection
- Incident Response Preparation, Organisation and Prevention
- Incident Response Reaction, Recovery and Maintenance
- Principles and Investigations of Computer Forensics for risk mitigation
- Computer Forensics – Tools and Acquisitions
- Computer Forensics – Analysis and validation
- Disaster Recovery – Preparation, Operation and Maintenance
- Business Continuity – Preparation, Operations and Maintenance
Published at :
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...