Learn comprehensive security system design, monitoring, and protection for networks and data.Security Infrastructure Management
Learn comprehensive security system design, monitoring, and protection for networks and data.Security Infrastructure Management
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Tools for Security Specialists Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
Instructors:
English
Not specified
What you'll learn
Learn to construct proper security systems and monitoring protocols
Master defense in depth strategies and policy management
Implement network defense and endpoint protection measures
Develop physical security control frameworks
Understand data types and CIA triad principles
Manage application security effectively
Skills you'll gain
This course includes:
10 Hours PreRecorded video
12 app items
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 3 modules in this course
This course provides a comprehensive introduction to security infrastructure management fundamentals. The curriculum covers three main areas: system security construction and monitoring, network and physical location protection, and information security at both application and data levels. Through hands-on assignments, students learn defense in depth strategies, monitoring and response protocols, and policy management. The course emphasizes practical skills in network defense, endpoint protection, and physical security controls, while also covering data classification, CIA triad principles, and application management.
Introduction to Security Infrastructure Management
Module 1 · 3 Hours to complete
Network & Physical Security
Module 2 · 3 Hours to complete
Data & Application Security
Module 3 · 3 Hours to complete
Fee Structure
Instructors

30 Courses
Experienced Educator and Director of Content at Codio
Patrick Ester, the Director of Content at Codio, brings a wealth of teaching experience to his role in educational technology. With a decade of classroom experience, Ester specialized in integrating computer-based activities into the curriculum and teaching coding to students. His expertise extends to leading workshops on physical computing, demonstrating his commitment to hands-on, practical technology education. At Codio, Ester leverages his background to develop comprehensive Python programming courses, including "Python Programming: Basic Skills," "Python Programming: Intermediate Concepts," and "Python Programming: Object-Oriented Design." His transition from classroom teaching to directing content for an educational technology platform showcases his ability to apply practical teaching experience to the development of online learning resources, particularly in the field of computer science and programming education.
Cybersecurity Expert and Education Engineer
Shanace Robinson is a Cyber SIEM Subject Matter Expert and Education Engineer at Codio, where she specializes in cybersecurity education. With a robust background in security infrastructure management, she teaches several online courses on Coursera, including Security Infrastructure Management and SOAR for Enterprise Security. Shanace is dedicated to empowering learners by providing them with the foundational knowledge and practical skills necessary to navigate the complexities of cybersecurity. Her courses are designed to cater to novice learners, offering insights into how organizations monitor and respond to security threats effectively. Through her engaging teaching style and commitment to education, Shanace plays a vital role in preparing the next generation of cybersecurity professionals to tackle real-world challenges in the field.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.