Computer and Mathematical
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
by Central University of Technology, Free State
by The Independent Institute of Education (Pty) Ltd
by Sol Plaatje University
by Richfield Graduate Institute Of Technology (Pty) Ltd. (previously known as PC Training And Business College (Pty) Ltd)
by University of Venda
by Nelson Mandela University
by Lyceum College (Pty) Ltd
by Central University of Technology, Free State
by Richfield Graduate Institute Of Technology (Pty) Ltd. (previously known as PC Training And Business College (Pty) Ltd)
by Walter Sisulu University
This page includes information from the O*NET 28.3 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. Builtneat Pty Ltd trading as Study Start, has modified all or some of this information. USDOL/ETA has not approved, endorsed, or tested these modifications.