The course begins by explaining the importance of protecting the integrity and confidentiality of personal data. The role and relevance of risk analysis and a security policy are then described.
The course describes ways of protecting communications networks and databases from intrusion and attack. The use of encryption and digital certificates to protect communications is explained. The various forms of malware are compared and measures to minimise the risk of malware are described.
Finally, the course considers the threats to the availability of telecoms services and potential fraudulent misuse of those services, then describes measures that can be taken to reduce the vulnerability to those threats.
Course prerequisites:
An appreciation of the services offered by telecommunications operators and the structure of the networks that provide such services. It is recommended that the PTT online course TCA: “Telephony and data services” is studied before attempting this security course.
Course objectives:
By the end of this course you will be able to:
- explain the need to protect information gathered by an organisation about its customers and employees.
- describe the various types of electronic and social engineering attack that threaten the confidentially of personal data.
- describe the role and relevance of risk analysis and a security policy.
- describe the threats to the security of information stored in databases.
- explain methods of ensuring the confidentially, integrity and availability of transmitted and stored data.
- explain the factors that have increased the risk of intrusion in modern networks.
- describe the vulnerabilities of networks attached to the Internet.
- explain methods of protecting networks and the services they provide from intrusion, denial of service and data theft.
- explain the obligations and commercial need of telecoms operators to protect their networks and services from possible threats.
- describe measures that can be taken to improve the resilience of telecoms systems.
- give examples of the ways in which criminals may misuse telecoms services for financial gain.
- explain measures that can be taken to minimise fraud.
Course Content
Module 1: Protecting personal data
Who Should Attend
Target audience:
This online course is aimed at those who have a role to play in reducing the vulnerability of telecommunication systems and databases to security breaches and fraudulent misuse.