$2,495.00
Schedule
Sep 10-14 - 5 days
Location
Round Rock, TX
Delivery Method
Classroom
Certification
Certification of Completion
Audience / Level
-
Prerequisites
-
Requirements
Laptop required
Course Details
Program Introduction
SECURITY & RISK MANAGEMENT
Security Governance Principles Compliance, Professional Ethics Security Documentation, Risk Management, Threat Modeling Business Continuity Plan Fundamentals, Acquisition Strategy and Practice Personnel, Security Policies, ,Security Awareness and Training
ASSET SECURITY
Asset Security Privacy Protection Asset Retention Data Security Controls Secure Data Handling
SECURITY ENGINEERING
Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities
COMMUNICATIONS AND NETWORK SECURITY
Network Protocol Security Network Components Security Communication Channel Security Network Attack Mitigation
IDENTITY AND ACCESS MANAGEMENT
Physical and Logical Access Control Identification, Authentication, and Authorization Identity as a Service Authorization Mechanisms Access Control Attack Mitigation
SECURITY ASSESSMENT AND TESTING
System Security Control Test Software Security Control Testing Security Process Data Collection Audits
SECURITY OPERATIONS
Security Operations Concepts Physical Security Personnel Security Logging and Monitoring Preventative Measures Resource Provisioning and Protection Patch and Vulnerability Management Change Management Incident Response Investigations Disaster Recovery Planning Disaster Recovery Strategies Disaster Recovery Implementation
SOFTWARE DEVELOPMENT SECURITY
Security Principles in the System Lifecycle Security Principles in the Software Development Lifecycle Database Security in Software Development Security Controls in the Development Environment Software Security Effectiveness Assessment
Security Governance Principles Compliance, Professional Ethics Security Documentation, Risk Management, Threat Modeling Business Continuity Plan Fundamentals, Acquisition Strategy and Practice Personnel, Security Policies, ,Security Awareness and Training
Asset Security Privacy Protection Asset Retention Data Security Controls Secure Data Handling
Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities
Network Protocol Security Network Components Security Communication Channel Security Network Attack Mitigation
Physical and Logical Access Control Identification, Authentication, and Authorization Identity as a Service Authorization Mechanisms Access Control Attack Mitigation
System Security Control Test Software Security Control Testing Security Process Data Collection Audits
Security Operations Concepts Physical Security Personnel Security Logging and Monitoring Preventative Measures Resource Provisioning and Protection Patch and Vulnerability Management Change Management Incident Response Investigations Disaster Recovery Planning Disaster Recovery Strategies Disaster Recovery Implementation
Security Principles in the System Lifecycle Security Principles in the Software Development Lifecycle Database Security in Software Development Security Controls in the Development Environment Software Security Effectiveness Assessment