|
Feb 05, 2025
|
|
|
|
NET 732 - Principles of Incident Response and Disaster Recovery Course Department: Business 3 Credits Total Lecture Hours: 30 Total Lab Hours: 30 Total Clinical Hours: 0 Course Description: This course covers the fundamentals of information security, risk management, contingency planning, and incident response. Students will learn how to secure and protect information assets and systems, manage risks and contingencies, and respond to incidents effectively and efficiently. Students will also learn about the relevant Principles of Incident Response Desc.t laws, regulations, standards, tools, techniques, and best practices in these domains. This course will equip students with the skills and knowledge needed for information security careers. This class will also help you develop your critical thinking skills as you evaluate various technology topics and concepts and find their connections and applications in a lab setting. This skill will help you in any technology career you pursue. Additionally, this class will improve your hands-on technology literacy which will enable you to make informed and effective decisions in your work.
Prerequisites: NET 479 - Principles of Information Security Mode(s) of Instruction: Traditional/Face-to-Face, Online
Course Fees: ebook/Access Code: $124.99 (charged once per term for all courses that use Cengage Unlimited)
Student Learning Outcomes and Objectives:
- Define and explain information security and its role in the organization.
- Identify and explain the basic concepts and phases of risk management and contingency planning.
- Discuss key laws, regulations, and standards associated with contingency planning and incident response.
- Describe the contingency planning life cycle, the business impact analysis, and the budgeting process.
- Explain the strategies and alternatives for data and application availability, backup, and recovery.
- Describe the process, policy, and practices of incident response planning and organization.
- Discuss the skills, abilities, procedures, training, and deployment of the CSIRT.
- Identify the parts of a kill chain and the methods of detecting incidents by type and in general.
- Explain the components, functions, capabilities, and locations of intrusion detection and prevention systems and security information and event management systems.
- Explain the incident reaction, containment, recovery, and maintenance strategies for different categories of incidents.
Add to Pathway (opens a new window)
|
|