COMP 5345 Information systems security and cybersecurity
Application of methodologies for the security of information systems. Assessment of current security risks faced by companies and options available on the market for risk mitigation. Discussion and application of security controls and techniques; standards, design, monitoring and security of operating systems, controls used to ensure levels of availability, confidentiality and integrity and intrusion detection and business continuity techniques in the event of computer disasters.