FI2DEIS05 IT Security & Analysis
FI2DEIS05 IT Security & Analysis
- Course description
- Course CodeFI2DEIS05
- Level of Study5.2
- Program of StudyDevOps Engineering
- Credits5
- Study Plan CoordinatorFrederick Johannes Botha
This course provides candidates with comprehensive knowledge of IT security principles and practices that are essential for safeguarding DevOps environments. Candidates will learn how to analyse, prevent, and triage common IT network security vulnerabilities. Additionally, candidates will gain insights into performing system monitoring and identifying attack vectors by researching hacking methodologies. Candidates will learn how to configure and maintain security protocols at each layer of the development cycle, providing a security environment for their product pipelines, protecting value chains; with a key focus on the zero-trust security paradigm.
The candidate…
- has knowledge of concepts, theories, models, processes, and tools used in IT security for DevOps environments.
- has knowledge of the Zero Trust security paradigm and its application across development and operational systems.
- has knowledge of threats across OSI layers and the methodologies used to identify and mitigate them.
- has knowledge of common hacking techniques, attack vectors, and indicators of compromise.
- has knowledge of data encryption methods, security protocols, and mitigation tools.
- has knowledge of IT security implementation across multiple layers of a system, including network, application, and infrastructure.
- has knowledge of pipeline security systems and procedures to protect development workflows and value chains.
- can assess his/her own security practices in relation to applicable norms, standards, and compliance requirements.
- is familiar with the history, evolution, and role of IT security in modern computing and digital product delivery.
- has insight into his/her own opportunities for development in cybersecurity specialisations and advanced security analysis.
The candidate…
- can explain his/her vocational choices in relation to IT security strategies, tools, and protocols.
- can reflect over his/her own vocational practice in IT security and adjust it under supervision to address vulnerabilities and meet security requirements.
- can find and refer to information, threat intelligence, and vocational material related to IT security, and assess its relevance to specific security incidents or risks.
The candidate…
- can plan and carry out IT security tasks and projects alone or as part of a group, in accordance with ethical requirements, professional standards, and legal regulations.
- can exchange points of view with others in the trade/discipline and participate in discussions about the development of good security practices.
- can contribute to organisational development by implementing proactive risk management, security awareness programs, and resilient security architectures.
Digital Learning Resources
The learning management system (LMS) is the primary learning platform where students access most of their course materials. The content is presented in various formats, such as text, images, models, videos or podcasts. Each course follows a progression plan, designed to lead students through weekly modules at their own pace. Exercises and assignments (individual or in groups) are embedded throughout the courses to support continuous practice and assessment of the learning outcomes.
Campus Resources
In addition to the digital learning resources, campus students participate in physical learning activities led by teachers as part of the overall delivery.
Guidance
Guidance and feedback from teachers support students' learning journeys, and may be provided synchronously or asynchronously, individually or in groups, via text, video or in-person feedback.
