Drexel Classifieds>Drexel Online Courses>Information Technology and Security Principles

Information Technology and Security Principles

About this Course

The course begins with an introduction to enterprise architecture and IT fundamentals, laying the groundwork for understanding how different technological components contribute to overall risk. You will explore the roles of hardware, software, networking, and cloud technologies, and learn how to incorporate these elements into comprehensive risk management strategies. This foundational knowledge will help you appreciate the complexities of IT infrastructure and its impact on organizational risk. As the course progresses, you will delve into IT project and lifecycle risk management. This module focuses on the unique challenges posed by IT projects, emphasizing the importance of managing risks throughout the project and system development lifecycles. You will learn to develop and implement disaster recovery and business continuity plans, ensuring your organization is prepared to handle potential disruptions and maintain operational resilience in the face of unexpected events. In the latter part of the course, attention shifts to the rapidly evolving landscape of emerging technologies and the critical importance of information security. You will gain a thorough understanding of core security principles such as confidentiality, integrity, and availability. Additionally, this module covers advanced security measures and data privacy fundamentals, equipping you with the knowledge to implement effective access controls and encryption techniques. By the end of the course, you will be well-versed in the strategies needed to navigate data privacy regulations and protect sensitive information against emerging threats. This course is designed for IT professionals, security analysts, and risk managers who want to deepen their understanding of IT and security principles. A basic familiarity with IT concepts and security fundamentals is recommended.

Created by: Packt


Related Online Courses

This is a self-paced lab that takes place in the Google Cloud console. In this lab, you configure a network to record traffic to and from an apache web server using VPC Flow Logs. You then export... more
Welcome to the specialization course of Designing data-intensive applications. This course will be completed on four weeks, it will be supported with videos and exercises. By the end of this... more
An entrepreneur is someone who is always on the lookout for problems that can be turned into opportunities and finds creative ways to leverage limited resources to reach their goals. In this... more
By the end of this guided project, you will be fluent in creating Program Communications artefacts for the Identification/Planning Phase for diverse programs. You will utilise a logical diagramming... more
This specialization is intended for Cybersecurity and Application Security Specialists, IT Security Managers, System Administrators, Software Developers, and Penetration Testers.\\n\\nThis... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL