DURATION: 5 Days
Course Overview
DAY 1
- Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Understand and apply concepts of confidentiality, integrity and availability
- Apply security governance principles through
- Compliance
- Understand legal and regulatory issues pertain to information security in a global context
- Understand professional ethics
- Develop and implement documented security policy, standards, procedures and guidelines.
- Understand business continuity requirements
- Contribute to personnel security policies
- Understand and apply risk management concepts
- Understand and apply threat modelling
- Integrate security risk considerations into acquisition strategy and practice
- Establish and manage information security education, training and awareness
DAY 2
- Asset Security (Protecting Security of Assets)
- Classify information and supporting assets (e.g. sensitivity, criticality)
- Determine and maintain ownership (e.g., data owners, system owners, business/mission owners
- Protect Privacy
- Ensure appropriate retention (e.g., media, hardware, personnel)
- Determine data security controls (e.g., data at rest, data in transit)
- Establish handling requirements (markings, labels, storage, destruction of sensitive information)
- Security Engineering (Engineering and Management of Security)
- Implement and manage engineering processes using secure design principles
- Understand the fundamental concepts of security models (e.g., Confidentiality, integrity and multi-level models)
- Select controls and countermeasures based upon systems security evaluation models
- Understand security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
- Assess and mitigate the vulnerabilities of security architectures, designs and solution elements
- Assess and mitigate vulnerabilities in web-based systems (e.g., XML, OWASP)
- Assess and mitigate vulnerabilities in mobile systems
- Assess and mitigate the vulnerabilities in embedded devices and cyber-physical systems (e.g., network-enables devices, internet of things (IOT)
- Apply cryptography
- Apply secure principles to site and facility design
- Design and implement physical security
DAY 3
- Communications and Network Security (Designing and Protecting Network Security)
- Apply secure design principles to network architecture (e.g., IP & non-IP protocols, segmentation
- Secure Network components
- Design and establish secure communication channels
- Prevent or mitigate network attacks
- Identify and Access Management (Controlling Access and Managing Identity)
- Control physical and logical access to assets
- Manage identification and authentication of people and devices
- Integrate Identity as a service (e.g, cloud identity)
- Integrate third-party identity services (e.g., on-premise)
- Implement and manage authorization mechanisms
- Prevent or mitigate access control attacks
- Manage the identity and access provisioning lifecycle (e.g., provisioning review)
DAY 4
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Design and validate assessment and test strategies
- Conduct security control testing
- Collect security process data (e.g, management and operational controls)
- Analyse and report test outputs (e.g. automated, manual)
- Conduct or facilitate internal and third party audits
- Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Understand and support investigations
- Understand requirements for investigation types
- Conduct logging and monitoring activities
- Secure the provisioning of resources
- Understand and apply foundational security operations concepts
- Employ resource protection techniques
- Conduct incident management
- Operate and maintain preventative measures
- Implement and support patch and vulnerability management
- Participate in and understand change management process (e.g., versioning, baselining, security impact analysis)
- Implement recovery strategies
- Implement disaster recovery processes
- Test disaster recovery plans
- Participate in business continuity planning and exercises
- Implement and manage physical security
- Participate in addressing personal safety concerns(e.g. Duress, travel, monitoring)
DAY 5
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
- Understand and apply security in the software development lifecycle
- Enforce security controls in development environments
- Assess the effectiveness of software security
- Assess security impact of acquired software
- MOCK TEST