Prerequisites
Have followed or mastered the concepts of the Architecture of infrastructure 1 and Architecture of infrastructure 2 workshops.
Goals
At the end of the course, the participant will be able to propose and improve a corporate security architecture framework.
Educational approach
Lectures assisted by team scenarios
Certificate issued at the end of the course
A certificate of participation is given to people who have attended more than 80% of the training hours security jobs description.
Teaching materials
To come up.
Other features
In order to achieve a good level of mastery, the participant should complete the course with personal practice.
Course content
Introduction
Security architecture concepts
Reference frames
Assessment of the maturity of a security architecture and success criteria
Organization of a company's security structures: users, processes and technologies
2 Management of corporate information assets
Concepts, ecosystems, user behavior, categorization of information
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
3 Identity and access management
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
4 Communication and networking management
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
5 Management of information systems and software
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
6 Threat and security incident management
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
7 Business and technological continuity
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
Have followed or mastered the concepts of the Architecture of infrastructure 1 and Architecture of infrastructure 2 workshops.
Goals
At the end of the course, the participant will be able to propose and improve a corporate security architecture framework.
Educational approach
Lectures assisted by team scenarios
Certificate issued at the end of the course
A certificate of participation is given to people who have attended more than 80% of the training hours security jobs description.
Teaching materials
To come up.
Other features
In order to achieve a good level of mastery, the participant should complete the course with personal practice.
Course content
Introduction
Security architecture concepts
Reference frames
Assessment of the maturity of a security architecture and success criteria
Organization of a company's security structures: users, processes and technologies
2 Management of corporate information assets
Concepts, ecosystems, user behavior, categorization of information
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
3 Identity and access management
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
4 Communication and networking management
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
5 Management of information systems and software
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
6 Threat and security incident management
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
7 Business and technological continuity
Concepts, ecosystems, user behavior
Principles, procedures, norms, standards and governance
Risk Assessment
Associated technologies
No comments:
Post a Comment