This course is an introduction to how to create a secure base line for your computer systems. We will introduce the best practice advice from the Council on Cyber Security critical security controls.
Going through the "first five", we will describe why they are relevant, how you will be protected when implementing it and show you how to implement it on real systems.
We have structured the course around four main parts, covering the recommendations. An introduction to the idea and the implications of each control is presented, followed by a demonstration showing how to actually implement it on your systems.
The time is takes to work your way through the course, will vary according to your skill level. We aim for 5-10 hours of work - more if you decide to read up on links and other extra material supplied.
You should take this course if you know some IT, but are new to the concept of security, or if you are a seasoned processional, in need of new inspiration and up-to-date information on how to implement security in your company.
Note that we are currently building this course, and we expect it to be finalized ultimo January 2016.
I have been working with computers and electronics for decades, and holds a master degree from the Technical University of Denmark. More recently, besides doing consultancy at MN Works, I have been teaching college-level computer science, programming, operating systems and security.
My main focus is to create value for my students by teaching hand-on techniques and useful operational skills. Such skills also require a level of theoretical knowledge, which will be included also.
It is this basic approach to teaching that I bring to my on line courses. For most people, computer systems are tools to be used, and we aim to teach just that.
My name is Maria and I work as a Research and Development Engineer at MN Works.
My background is IT technology with a PBA in product development and technology integration. I like to help others to expand their understanding of IT and the importance of security in a growing IT world.
In the IT technologist education I have specialized in:
IT security and procedure
Databases and the correlation between interfaces
How to reconcile expectations with customers and what you have to remember in this context
In my BA my main focus have been:
How to conduct survey and research