Accepted best practices and guidelines to secure information systems and networks. Detection of abnormal events, intrusion detection, incident handling, response, and recovery. Security policies, system configuration, integration, and maintenance.
3 Credits