Gedetailleerde cursusinhoud
- Module 1 – Introduction to IT Security a. Understanding Security b. Responsibilities c. Building a Security Program d. CIA Triad e. Governance, Risk, Compliance f. State of Security Today
- Module 2 – Risk Management a. Risk Management b. Risk Assessment c. Types of Risk, Threats and Vulnerabilities d. Mitigating Attacks e. Discovering Vulnerabilities and Threats f. Responding to Risk
- Module 3 – Understanding of Cryptography a. Understanding Cryptography b. Symmetric Encryption c. Asymmetric Encryption d. Hashing e. PKI f. Cryptography in Use
- Module 4 – Understanding Identity and Access Management a. Identity Management b. Authentication Techniques c. Single Sign-on d. Access Control Monitoring
- Module 5 – Managing Data Security a. Virtualization Principles b. Key Components Mapped to Cloud Layer c. Key Security Concerns d. Other Technologies Used in the Cloud e. The Layers f. Relevant CCM Controls
- Module 6 – Data Security a. Different Types of Storage b. Encryption Options c. Data Management
- Module 7 – Managing Server/Host Security a. The Operating Systems b. Hardening the OS c. Physical security d. Virtualization and Cloud Technologies
- Module 8 – Application Security for Non-Developers a. Application Security Principle b. Software Development Life Cycle c. OWASP Top 10 d. Hardening Web Applications e. Patch/Update/Configuration Management
- Module 9 – Understanding Mobile Device Security (IoT) a. What Devices are we talking about? b. What is the risk? c. Hardening Mobile/IoT Devices d. Corporate Management
- Module 10 – Managing Day to Day Security a. Company Responsibilities b. Product Management c. Business Continuity Basics d. Incident Response e. Why Train?
- Module 11 – Understating Compliance and Auditing a. Benefits of Compliance b. Assurance Frameworks c. What is Auditing"