Understanding Data Sources

100% ONLINE

SELF-PACED

NO COST

Summary

Understanding Data Sources is one piece of the ‘how to be a cyber security analyst’ puzzle. This certificate was originally created as a part of a semester long course called ‘Security Operations’ and is intended to help the student better understand where security data originates from and how to make the best use of it as a part of working in a Security Operations Center (SOC).

Duration: 2 hours

Location: Online

Modality: Self-paced

This Course is not for Academic Credit

What you'll learn:

This certificate will discuss where the data that CyberSecurity analysts review actually comes from.

Module and Content:

This is a self-paced certificate, with optional quizzes and open discussion to help solidify your comprehension of the material.

Learning Objectives:

This course helps the student better understand where security data originates from and how to make the best use of it as a part of working in a Security Operations Center (SOC).

Who is this certificate designed for:

This material will help any facet of the cyber security profession (audit, governance, compliance, engineering, architecture) to better understand security data.

What you'll receive:

Upon finishing this certificate, students will receive an online certificate of completion.

Meet the instructor:

Kristy.png

Kristy Westphal

Faculty Associate Arizona State University

Kristy Westphal is a versatile information technology professional with specific experience in providing advisory and management services in the area of information security and risk is currently employed as the Vice President, CSIRT at Union Bank. Specializing in leadership and program development, specific expertise in security areas includes: process analysis, risk assessments, security awareness programs, operating system security, network security, incident handling, vulnerability analysis and policy development.