- Level Foundation
- Duration 8 hours
- Course by ISC2
-
Offered by
About
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to: Explain concepts of security operations. - Discuss data handling best practices. - Identify important concepts of logging and monitoring. - Summarize the different types of encryption and their common uses. - Describe the concepts of configuration management. - Explain the application of common security policies. - Discuss the importance of security awareness training. - Practice the terminology of and review the concepts of network operations. Agenda Course Introduction Module 1: Understanding Data Security and Encryption Module 2: Controls and Asset Management Module 3: Best Practice Security Policies Module 4: Understand Security Education Training and Awareness (SETA) Module 5: Security Operations Review Final Assessment This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.Modules
Course Introduction
1
Videos
- Course Introduction
1
Readings
- Course Agenda
Understanding Data Security and Encryption
1
Assignment
- Self Check: Logging
5
Videos
- Data Handling
- Disposition of Data
- Encryption
- Symmetric Ciphers
- Hashing
12
Readings
- Understanding Data Security and Encryption Overview
- Data Handling
- Data Handling Practices - Classification
- Data Handling Practices - Labeling
- Data Handling Practices - Retention
- Data Handling Practices - Destruction
- Logging and Monitoring Security Events
- Event Logging Best Practices
- Encryption Overview
- Encryption Overview - Symmetric Encryption
- Encryption Overview - Asymmetric Encryption
- Encryption Overview - Hashing
Controls and Asset Management
1
Videos
- Controls and Asset Management
1
Readings
- Configuration Management Overview
Best Practice Security Policies
2
Assignment
- Self Check: Privacy Policy
- Self Check: Change Management Policy
2
Videos
- Say What you Do, Do What You Say
- Change Management
3
Readings
- Best Practice Security Policies Overview
- Common Security Policies
- Change Management Components
Understand Security Education Training and Awareness (SETA)
1
Videos
- Understand Security Education Training and Awareness (SETA)
3
Readings
- Understand Security Education Training and Awareness (SETA) Overview
- What is Security Awareness Training?
- Security Awareness Training Examples
Security Operations Review
1
Assignment
- Security Operations Quiz
1
Peer Review
- Peer Review
2
Videos
- Security Operations Review
- Security Operations Quiz
2
Readings
- Course Summary
- Terms and Definitions
Final Assessment
1
Assignment
- Final Assessment
Auto Summary
"Security Operations" is a foundational IT & Computer Science course on Coursera, led by expert instructors. It delves into daily security controls, risk mitigation, data security, encryption, logging, monitoring, configuration management, and security policies. With a 480-minute duration, the course is ideal for IT professionals, career changers, and students aiming for cybersecurity leadership. No prerequisites are required, making it accessible to beginners. Subscriptions start with the Starter plan. Perfect for those preparing for the Certified in Cybersecurity entry-level exam.

ISC2 Education & Training