Modelling the Security Administration Role in Action
Training Provider: SINGAPORE MANAGEMENT UNIVERSITY
Course Reference: TGS-2020503018
S$600
Original: S$2,000
Save S$1,400
About This Course
Participants will be able to describe the activities and responsibilities of the security administration role; be able to correlate the key security due diligence for consideration to the respective security administration tasks; be able to highlight the types of possible threats and risks relating to specific security administration functions.
What You'll Learn
Attending to a routine security administration work related to Systems, Database, Network, Computer and Data access.
Performing Tactical Tasks
- Monitoring and ensuring timely security updates and patches are administered.
- Configuring and administrating security related works
Performing Management/Strategic Tasks
- Recommending to senior management security enhancements to address areas of potential threats
- Analysing and seeking management’s attention on critical security-related administration that are at risks to be carried out.
Performing Tactical Tasks
- Monitoring and ensuring timely security updates and patches are administered.
- Configuring and administrating security related works
Performing Management/Strategic Tasks
- Recommending to senior management security enhancements to address areas of potential threats
- Analysing and seeking management’s attention on critical security-related administration that are at risks to be carried out.
Entry Requirements
Basic IT knowledge & fundamentals of cybersecurity
Course Details
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.
More Courses from SINGAPORE MANAGEMENT UNIVERSITY
In today’s rapidly evolving technological landscape, the emphasis on digital transformation is mor...
This certificate programme is designed for non-technical professionals who want to develop data visu...
This programme covers the operational aspects of data protection and information security. It seeks ...