We may earn an affiliate commission when you visit our partners.
Course image
Patrick Ester and Shanace Robinson

This course is designed for novice learners wanting to understand the basics of security infrastructure management.

Read more

This course is designed for novice learners wanting to understand the basics of security infrastructure management.

To allow for a self-paced learning experience, this course is video-free. Assignments contain short explanations with images. You'll benefit from instant feedback from a variety of assessment items along the way, gently progressing from quick understanding checks (multiple choice, fill in the blank, and un-scrambling blocks of text) to small, approachable summative assessments that take minutes instead of hours.

Enroll now

Two deals to help you save

What's inside

Syllabus

Introduction to Security Infrastructure Management
Welcome to Week 1 of the Security Infrastructure Management course. These assignments cover the concepts of defense in depth, monitoring & response, and policy management. The module ends with graded summative assessments.
Read more
Network & Physical Security
Welcome to Week 2 of the Security Infrastructure Management course. These assignments cover the concepts of network defense, endpoint protection, and physical security controls. The module ends with graded summative assessments.
Data & Application Security
Welcome to Week 3 of the Security Infrastructure Management course. These assignments cover the concepts of the different types of data, the CIA triad, and application management. The module ends with graded summative assessments.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops foundational knowledge on security infrastructure management strategies, which are applicable to many roles across industries and career levels
Assesses learning in a variety of ways, including interactive and quick checks, to reinforce concepts
Provides immediate feedback throughout the learning process, allowing for self-paced progress and rapid understanding
Suitable for beginners in the field of security infrastructure management
Covers core concepts of security infrastructure management, including defense-in-depth, monitoring and response, and policy management

Save this course

Save Security Infrastructure Management to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Infrastructure Management with these activities:
Review Network Security Concepts
Review network security concepts to strengthen your foundation.
Browse courses on network security
Show steps
  • Review notes and materials from previous coursework.
  • Explore online resources and tutorials.
Identify Security Vulnerabilities
Practice identifying common security vulnerabilities to enhance your understanding of security monitoring and response.
Browse courses on Security Vulnerabilities
Show steps
  • Review security reports.
  • Use vulnerability scanning tools.
  • Analyze logs.
Configure Security Monitoring Tools
Explore tutorials on configuring security monitoring tools to improve your understanding of monitoring and response.
Browse courses on Security Monitoring
Show steps
  • Identify available security monitoring tools.
  • Choose and install a security monitoring tool.
  • Configure and test the security monitoring tool.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Deploy a Network Firewall
Build a network firewall to solidify your understanding of network defense concepts.
Browse courses on network security
Show steps
  • Identify the network and security requirements.
  • Choose and configure the appropriate firewall.
  • Deploy and test the firewall.
  • Monitor and maintain the firewall.
Participate in a Security Forum
Engage in discussions with peers to share and exchange knowledge on security infrastructure.
Show steps
  • Find and join a security forum.
  • Contribute to discussions and ask questions.
  • Learn from others and expand your knowledge.
Design a Security Policy
Create a detailed security policy document to enhance your understanding of policy management.
Browse courses on Security Policy
Show steps
  • Gather input from stakeholders.
  • Identify and document security requirements.
  • Develop and refine security policies.
  • Communicate and enforce security policies.
Attend a Security Conference
Immerse yourself in the latest security trends and best practices by attending a security conference.
Show steps
  • Research and identify relevant security conferences.
  • Register and attend the conference.
  • Take notes and gather materials.
Contribute to an Open-Source Security Project
Apply your knowledge and contribute to the security community by working on an open-source security project.
Show steps
  • Identify an open-source security project to contribute to.
  • Fork and clone the project repository.
  • Make changes and submit a pull request.

Career center

Learners who complete Security Infrastructure Management will develop knowledge and skills that may be useful to these careers:
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain cybersecurity systems to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be helpful in providing a foundation in the principles of cybersecurity, which can be applied to the day-to-day work of a Cybersecurity Engineer. Knowledge of defense in depth, monitoring & response, and policy management can help Cybersecurity Engineers make informed decisions about how to protect their organizations from cyber threats.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems to protect an organization's network and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be helpful in providing a foundation in the principles of network security, which can be applied to the day-to-day work of a Network Security Engineer. Knowledge of network defense, endpoint protection, and physical security controls can help Network Security Engineers make informed decisions about how to protect their organizations from cyber threats.
Security Architect
Security Architects design and implement security systems and networks to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be helpful in providing a foundation in the principles of security architecture, which can be applied to the day-to-day work of a Security Architect. Knowledge of defense in depth, monitoring & response, and policy management can help Security Architects make informed decisions about how to protect their organizations from cyber threats.
Security Manager
Security Managers oversee and manage the security of an organization's computer systems and networks. This course can be helpful in providing a foundation in the principles of security management, which can be applied to the day-to-day work of a Security Manager. Knowledge of defense in depth, monitoring & response, and policy management can help Security Managers make informed decisions about how to protect their organizations from cyber threats.
Incident Responder
Incident Responders respond to and mitigate cyber threats. This course can be helpful in providing a foundation in the principles of incident response, which can be applied to the day-to-day work of an Incident Responder. Knowledge of defense in depth, monitoring & response, and policy management can help Incident Responders make informed decisions about how to respond to and mitigate cyber threats.
Security Administrator
Security Administrators manage and maintain security systems and networks to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be helpful in providing a foundation in the principles of security administration, which can be applied to the day-to-day work of a Security Administrator. Knowledge of defense in depth, monitoring & response, and policy management can help Security Administrators make informed decisions about how to protect their organizations from cyber threats.
Penetration Tester
Penetration Testers test the security of computer systems and networks to identify vulnerabilities. This course can be helpful in providing a foundation in the principles of penetration testing, which can be applied to the day-to-day work of a Penetration Tester. Knowledge of defense in depth, monitoring & response, and policy management can help Penetration Testers make informed decisions about how to test the security of computer systems and networks.
Security Analyst
Security Analysts monitor and protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be helpful in providing a foundation in the principles of security infrastructure management, which can be applied to the day-to-day work of a Security Analyst. Knowledge of defense in depth, monitoring & response, and policy management can help Security Analysts make informed decisions about how to protect their organizations from cyber threats.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze information about cyber threats to identify and mitigate risks. This course can be helpful in providing a foundation in the principles of threat intelligence, which can be applied to the day-to-day work of a Threat Intelligence Analyst. Knowledge of defense in depth, monitoring & response, and policy management can help Threat Intelligence Analysts make informed decisions about how to collect and analyze information about cyber threats.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be helpful in providing a foundation in the principles of security consulting, which can be applied to the day-to-day work of a Security Consultant. Knowledge of defense in depth, monitoring & response, and policy management can help Security Consultants make informed decisions about how to protect their clients from cyber threats.
Forensic Investigator
Forensic Investigators investigate cybercrimes and security breaches. This course can be helpful in providing a foundation in the principles of forensic investigation, which can be applied to the day-to-day work of a Forensic Investigator. Knowledge of defense in depth, monitoring & response, and policy management can help Forensic Investigators make informed decisions about how to investigate cybercrimes and security breaches.
Risk Analyst
Risk Analysts assess and manage the risks to an organization's computer systems and networks. This course can be helpful in providing a foundation in the principles of risk management, which can be applied to the day-to-day work of a Risk Analyst. Knowledge of defense in depth, monitoring & response, and policy management can help Risk Analysts make informed decisions about how to protect their organizations from cyber threats.
Data Protection Officer
Data Protection Officers oversee and manage the protection of an organization's data. This course can be helpful in providing a foundation in the principles of data protection, which can be applied to the day-to-day work of a Data Protection Officer. Knowledge of defense in depth, monitoring & response, and policy management can help Data Protection Officers make informed decisions about how to protect their organizations' data.
IT Auditor
IT Auditors review and evaluate an organization's computer systems and networks to ensure that they are secure and compliant with regulations. This course can be helpful in providing a foundation in the principles of IT auditing, which can be applied to the day-to-day work of an IT Auditor. Knowledge of defense in depth, monitoring & response, and policy management can help IT Auditors make informed decisions about how to protect their organizations from cyber threats.
Compliance Analyst
Compliance Analysts ensure that an organization's computer systems and networks are compliant with regulations. This course can be helpful in providing a foundation in the principles of compliance, which can be applied to the day-to-day work of a Compliance Analyst. Knowledge of defense in depth, monitoring & response, and policy management can help Compliance Analysts make informed decisions about how to protect their organizations from cyber threats.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Infrastructure Management.
Delves into the concepts of data protection, application security, and risk management, providing learners with a solid foundation in securing their digital assets.
Focuses on the practical aspects of implementing information security controls, providing valuable insights for those responsible for managing security operations.
Provides a structured approach to information security risk management, including risk assessment, mitigation, and communication.
Classic textbook that provides a foundational understanding of computer security concepts and techniques.
Provides a comprehensive overview of cryptography and network security concepts and techniques.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Infrastructure Management.
Data Science: A New Way of Thinking | 数据科学导论
Build an app with React, Redux and Firestore from scratch
The complete AutoCAD 2018-21 course
Python Project for Data Engineering
Web Scraping 101 with Python3 using REQUESTS, LXML &...
Complete Machine Learning & Reinforcement learning 2023
From Engineer to Technical Manager: A Survival Guide
Web Scraping with Python + BeautifulSoup
Visualizing & Communicating Results in Python with Jupyter
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser