This module provides knowledge about the processes and technologies involved in providing situational awareness through the detection, containment, and remediation of IT threats. It also presents the organizational developments related to security awareness, threats, and responses; ethics/codes of behaviour in information security. It is taught to Year 3 students in Computer science at National Police College (NPC), under the school of ICT. It is taught by Dr Richard MUSABE, Senior Lecturer in Computer and Software Engineering Department.
When computer security problem occurs in an organization, it affects the operationalization of that organization. It is critical for the affected organization to have a fast and effective means of responding. The speed with which the organization can recognize an incident or attack and then successfully analyze it and respond will dramatically limit the damage done and lower the cost of recovery. This ability to respond quickly and effectively to a computer security threat is a critical element in providing a secure computing environment for the operationalization of any organization.
In this course, you will learn different techniques on how to provide a secure computing environment for the operationalization of any organization. As today, data is the most active thing in organizations and the circular Internet, so in order to secure the organization data, different layers of security should be put in place at any given organization, these layers are;
Physical security, Personal security, Operations security, Communications security, Network security, Information security. All these aspects and others will be discussed in this module.
In this course, students will gain a global perspective of the challenges of designing a secure system
touching on all the cyber roles needed to provide acohesive security solution. Through lecture,
labs, and breakout discussion groups, they will learn about current threat trends across the Internet
and their impact on organizational security. Students will also review standard cyber security
terminology and compliance requirements, examine sample exploits, and gain hands-on
experience mitigating controls.