CYBERSECURITY NEWS

MMSCYBER008: Security Planning For the Enterprise (2 Days)

Security for the Enterprise

Security is no longer a job for one department, rather it is a job for every employee; it has become paramount to the continued success of an organization. Everyday attacks are becoming more sophisticated and attackers are discovering new methods to breach an organization’s defenses. The problem most organizations face is that security starts at the bottom and tries to work its way to the top level; time and time again this strategy has proven to be unsuccessful. Adapting a top-down approach will allow those in charge make sound business decisions with consideration to enterprise security. Organization’s that practice this top-down approach make it simple for employees to assimilate into a business philosophy that prioritizes security.

While having strong security is desirable, it will do you no good if it impedes the productivity of your business. The ideal security strategy will not only keep critical information secure, it will ensure the day-to-day production of your business. This course is designed to teach students how to integrate business functions along with a detailed security plan into one comprehensive strategy. Students will learn topics such as:

-Network Monitoring

-Securing User Applications

-Malware Defense

-Networks Boundary Defense

-Data Protection

-Network Access Control

-Penetration Testing

 

There is a gap in communication between decision makers and security personnel; this course will give IT professionals and executives a greater understanding of business driven security. It is vital to have decision makers that understand the impact of decisions not just on the function of the organization but also the impact it they may have on your security strategy. Students will learn about topics such as:

-Inventory Management

-Managing Authorized Systems and Software

-User Training Plans

-Incident Response Handling

-Network Security Planning and Implementation

 

After the conclusion of this course, students will be able to:

-Understand how to implement a variety of tools in order to build a comprehensive defense system for the network

-Identify gaps in security and implement automated tools or procedures to fill them

-Understand how business operations drive the needs for cyber security

-Develop policies for users to follow that facilitate the security of the network

-Understand how to leverage user and IT personnel education to increase the security of an organizations network and resources

-Understand how to monitor for cyber-attacks and how to properly respond to them

-Develop testing exercises that are used to evaluate the effectiveness of the networks defenses