Seven Academy

IT Security

Information security is without a doubt one of the most important aspects of our daily lives in the digital society we live in today. We are confronted daily with threats and therefore it is necessary especially for top level execs to be able to understand the nature of these threats and the mitigation techniques that can be setup to circumvent them. In 12 modules, this course teaches you about the threats and tools used to secure your environment and your enterprise data.

  • 19 students enrolled
  • By Joseph Nguangue

About this course

Information security is without a doubt one of the most important aspects of our daily lives in the digital society we live in today. We are confronted daily with threats and therefore it is necessary especially for top level execs to be able to understand the nature of these threats and the mitigation techniques that can be setup to circumvent them. In 12 modules, this course teaches you about the threats and tools used to secure your environment and your enterprise data.

Duration: 200 hours

What you would learn

  • Introduction to IT security and the foundations of the internet
  • Operating systems and OS security
  • Malwares, viruses and antiviruses
  • Internet security
  • Security on Social networks
  • Securing your email communications
  • Securing your mobile connected devices
  • Securing your cloud infrastructures
  • Securing your network connections and access
  • Data backup and disaster recovery

Expected Results

  1. An ability to analyze a problem, and to identify and define the computing requirements appropriate to its solution.
  2. An ability to design, implement and evaluate a computer-based solution to meet a given set of computing requirements in the context of the discipline.
  3. An ability to communicate effectively with a range of audiences about technical information.
  4. An ability to make informed judgements in computing practice based on legal and ethical principles.
  5. An ability to function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk and produce deliverables.
  6. An ability to apply security principles and practices to the environment, hardware, software, and human aspects of a system.
  7. An ability to analyze and evaluate systems with respect to maintaining operations in the presence of risks and threats.

course video

XAF 200,000 386000

93% Off

Two days left for this price

Enroll Now