Course Outline

  • Introduction
  • Governance
    • Governance
    • Security Program Documentation
    • Awareness and Training Considerations
    • Governance Frameworks
    • Governance, Risk, and Compliance (GRC) Tools
    • Management Involvement
    • Change and Configuration Management
    • The Data Lifecycle
    • Communication Considerations
  • Risk Management
    • Confidentiality Risk Considerations
    • Integrity Risk Considerations
    • Availability Risk Considerations
    • Privacy Risk Considerations
    • Risk Assessment Frameworks
    • Risk Assessment
    • Risk Response
    • Impact Analysis
    • Third-Party Risk Management
  • Compliance
    • Industry Compliance
    • Industry Standards
    • Security Frameworks
    • Security Organziation Control Type 2 (SOC 2)
    • NIST Cybersecurity Framework (CSF)
    • Cloud Security Alliance (CSA)
    • Privacy Regulations
    • Security Reviews
    • Cross-Jurisdictional Compliance
  • Resilient System Design
    • Security Devices
    • Monitoring and Detection
    • Network Traffic Management
    • Application Layer Security
    • Availability Considerations
    • Scaling Considerations
    • Recovery Strategies
    • Deployment Strategies
  • Secure Architecture Design
    • Data States
    • Data Classification
    • Data Labeling and Tagging
    • Data Loss Prevention (DLP)
    • Hybrid Infrastructures
    • Third-Party Integrations
    • Attack Surface Management
    • Control Effectiveness
  • Security in Systems
    • Hardware Assurance
    • Security Requirements
    • Software Assurance
    • Supply Chain Assurance
    • Pre-Deployment Testing
    • Post-Deployment Testing
    • Continuous Integration/Continuous Deployment (CI/CD) Management
    • Continuous Integration/Continuous Deployment (CI/CD) Testing
    • End-of-Life (EOL) Considerations
  • Access, Authentication, Authorization
    • Access Control Systems
    • Access Provision
    • Rule-Based Access Control
    • Role-Based Access Control (RBAC)
    • Identity and Authentication
    • Access Control Policies
    • Monitoring and Oversight
  • Zero Trust Design
    • Security Boundaries
    • VPN Architecture
    • Segmentation
    • Deperimeterization
    • Access Management
    • Application Programming Interface (API) Integeration and Validation
    • Asset Control
  • Hardware Security
    • Roots of Trust
    • Boot Options
    • Security Coprocessors
    • Self-Encrypting Drives (SED)
    • Host-Based Encryption
    • Self-Healing Hardware
    • Virtual Hardware
       

Requirements

  • Minimum of 10 years of general IT experience, with 5 years focused on IT security
  • Familiarity with concepts like governance frameworks, cryptography, and risk management
  • Access to basic lab hardware and software, such as virtualized appliances, Linux distributions, and scripting tools
 35 Hours

Testimonials (4)

Upcoming Courses

Related Categories