Course image Operation and Organization Security for AC _2020_2021
Trimester 1

This module provides knowledge about the processes and technologies involved in providing situational awareness through the detection, containment, and remediation of IT threats.  It also presents the organizational developments related to security awareness, threats, and responses; ethics/codes of behaviour in information security. It is taught to Year 3 students in Computer science at National Police College (NPC), under the school of ICT. It is taught by Dr Richard MUSABE, Senior Lecturer in Computer and Software Engineering Department.

Course image Organization and Operation Security
Trimester 1

When computer security problem occurs in an organization, it affects the operationalization of that organization. It is critical for the affected organization to have a fast and effective means of responding. The speed with which the organization can recognize an incident or attack and then successfully analyze it and respond will dramatically limit the damage done and lower the cost of recovery.  This ability to respond quickly and effectively to a computer security threat is a critical element in providing a secure computing environment for the operationalization of any organization.

In this course, you will learn different techniques on how to provide a secure computing environment for the operationalization of any organization. As today, data is the most active thing in organizations and the circular Internet, so in order to secure the organization data, different layers of security should be put in place at any given organization, these layers are;

Physical security, Personal security, Operations security, Communications security, Network security, Information security. All these aspects and others will be discussed in this module.

Course image CIS 3161: FOUNDATIONS OF CYBER SECURITY
Trimester 1

In this course, students will gain a global perspective of the challenges of designing a secure system

touching on all the cyber roles needed to provide acohesive security solution. Through lecture, 

labs, and breakout discussion groups, they will learn about current threat trends across the Internet 

and  their  impact  on  organizational  security.  Students  will  also  review  standard  cyber  security 

terminology  and  compliance  requirements,  examine  sample  exploits,  and  gain  hands-on 

experience mitigating controls.