Learn to Protect all forms of Information Technology
- Understand Vulnerabilities of Information Technology
- Secure IT systems
- Know how to detect issues
- Understand how to respond and data recovery
There are 11 lessons in this course:
Introduction to Cyber Security and cyber attacks/defences
Securing the facilities and networks
Securing your online digital footprint
Internet Security and Digital Certificates
Wireless Network Vulnerabilities, Attacks and Security
Firewalls, IDS and IPS
Access Control and Authentication
Cyber attack Disaster Recovery strategies
Ongoing Security Management
Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.
CYBER SECURITY IS ESSENTIAL IN ALL BUSINESSES
It is crucial for any business to protect a computer network with a well-designed and configured intrusion detection and intrusion prevention systems (IDPS).
To remain aware of change, and see threats coming, you must cultivate effective networking.
This involves developing contacts with others in the IT and Information industries; and continuing to cultivate those relationships.
Relationships may be developed in various ways:
- Social Networking
- Professional Associations
- One to one relationships with colleagues
- Relationships with service providers
Maintaining information security requires a certain attitude and if the person responsible does not have an appropriate attitude, they are vulnerable to failure.
Establishing and enforcing operational procedures in an organisation is an important part of ensuring information security is optimised. As with everything else, procedures need to be continually reviewed and changed, in the light of other changes that may impact upon those procedures. For example, when an organisation is small, a procedure for physically copying and storing a backup of information can be relatively simple but as an organisation grows and becomes more complex, or as new threats emerge an old procedure may no longer be the best procedure.
Products and Services
There are various products available that can be used to protect information in one way or another e.g. virus protection software, but you must always recognise the usefulness of a product does not remain stagnant i.e. virus protection must be continually updated to remain effective.Entrepreneurs are always looking for opportunities to supply products or services that fill a need by industry; and every time a new threat emerges to information, there will be people trying to develop solutions to those threats.
National and international laws can offer a degree of protection, but in today's world, new threats often emerge so often and so quickly that it is next to impossible for a legal solution to be enacted fast enough. If a threat damages your information security on a large enough scale, it can be viable to take legal action against the perpetrator, but this situation is rare. Taking someone to court in your own country is difficult and expensive. Taking them to court across international borders is an even more complex and costly situation.
Despite the problems involved with using the law for information security, laws can be an important deterrent. For that reason, if no other, it is important to keep laws as up to date as possible.
If information security is of significant importance to you it may be important for you to engage with "regulators" and contribute toward their awareness of laws which need updating or adopting.