Enterprise computer networks may be vulnerable to both inside and outside threats. Enterprise networks including Internet access, intranets, extranets and various business activities must be protected. Enterprise needs to manage and control security policies choosing from hundreds of available security rules. Within the network infrastructure there is security protection software including firewalls, Intrusion Detection and Prevention Systems (IDPS), Public Key Infrastructure (PKI), and Virtual Private Network (VPN) solutions. Important corporate information may be distributed across a variety of different systems. Networks have security point products - often from various vendors - with different security configurations. As IT Administrators, students will be faced with the task of Enterprise Security Management, which includes the coordination, implementation and monitoring of security attributes across varied, dispersed infrastructures. The dynamic nature of corporate networks means that they are no longer defined by physical boundaries, but instead by enterprise-wide information security policies. Students will learn how to deliver information security policies.
On successful completion of this unit, students will be able to:
This unit is not compulsory for any specific course. Depending on the course you study, this unit may be taken as an elective.