Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Introduction
- Governance
- Governance
- Security Program Documentation
- Awareness and Training Considerations
- Governance Frameworks
- Governance, Risk, and Compliance (GRC) Tools
- Management Involvement
- Change and Configuration Management
- The Data Lifecycle
- Communication Considerations
- Risk Management
- Confidentiality Risk Considerations
- Integrity Risk Considerations
- Availability Risk Considerations
- Privacy Risk Considerations
- Risk Assessment Frameworks
- Risk Assessment
- Risk Response
- Impact Analysis
- Third-Party Risk Management
- Compliance
- Industry Compliance
- Industry Standards
- Security Frameworks
- Security Organziation Control Type 2 (SOC 2)
- NIST Cybersecurity Framework (CSF)
- Cloud Security Alliance (CSA)
- Privacy Regulations
- Security Reviews
- Cross-Jurisdictional Compliance
- Resilient System Design
- Security Devices
- Monitoring and Detection
- Network Traffic Management
- Application Layer Security
- Availability Considerations
- Scaling Considerations
- Recovery Strategies
- Deployment Strategies
- Secure Architecture Design
- Data States
- Data Classification
- Data Labeling and Tagging
- Data Loss Prevention (DLP)
- Hybrid Infrastructures
- Third-Party Integrations
- Attack Surface Management
- Control Effectiveness
- Security in Systems
- Hardware Assurance
- Security Requirements
- Software Assurance
- Supply Chain Assurance
- Pre-Deployment Testing
- Post-Deployment Testing
- Continuous Integration/Continuous Deployment (CI/CD) Management
- Continuous Integration/Continuous Deployment (CI/CD) Testing
- End-of-Life (EOL) Considerations
- Access, Authentication, Authorization
- Access Control Systems
- Access Provision
- Rule-Based Access Control
- Role-Based Access Control (RBAC)
- Identity and Authentication
- Access Control Policies
- Monitoring and Oversight
- Zero Trust Design
- Security Boundaries
- VPN Architecture
- Segmentation
- Deperimeterization
- Access Management
- Application Programming Interface (API) Integeration and Validation
- Asset Control
- Hardware Security
- Roots of Trust
- Boot Options
- Security Coprocessors
- Self-Encrypting Drives (SED)
- Host-Based Encryption
- Self-Healing Hardware
- Virtual Hardware
Requirements
- Minimum of 10 years of general IT experience, with 5 years focused on IT security
- Familiarity with concepts like governance frameworks, cryptography, and risk management
- Access to basic lab hardware and software, such as virtualized appliances, Linux distributions, and scripting tools
35 Hours
Testimonials (4)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
I genuinely enjoyed the great information and content.