OverviewThis course is designed to help students establish and maintain a holistic and layered approach to security. Effective security requires a balance between detection, prevention, and response capabilities, but such a balance demands that controls be implemented on the network, directly on endpoints, and within cloud environments. The strengths and weaknesses of one solution complement another solution through strategic placement, implementation, and fine-tuning. To address these issues, this course focuses on combining strategic concepts of infrastructure and tool placement while also diving into their technical application. We will discuss and identify what solutions are available and how to apply them successfully. Most importantly, we'll evaluate the strengths and weaknesses of various solutions and how to layer them cohesively to achieve defense-in-depth. |
Learning Outcome
|
Who should Attend?
|
Eligibility Criteria
|
This course is endorsed under Critical Infocomm Technology Resource Programme Plus (CITREP+) Programme. To find out more about CITREP+ Funding, please refer to Programme Support under CITREP+ page |
Information is accurate as of 11 August 2020