OVERVIEW
This 5-day course takes an operational approach to implementing and managing effective cybersecurity in highly networked enterprises. Topics include an evaluation of government and commercial security management models; security program development; risk assessment and mitigation; threat and vulnerability analysis and risk remediation; cybersecurity operations; incident handling; business continuity planning and disaster recovery; security policy formulation and implementation; large-scale cybersecurity program coordination; management controls related to cybersecurity programs; information-sharing; and privacy, legal, compliance, and ethical issues.
WHO SHOULD TAKE THIS COURSE
Students should have taken a Cybersecurity Fundamentals course like a CompTIA Security+ course or have equivalent skills and experience.
WHY YOU SHOULD TAKE THIS COURSE
This course builds upon the skills and knowledge gained in the prior courses and moves into the heart of the ISSO role as it relates to the overall security operations of the enterprise. As such, this is perhaps the most important course in the ISSO program.
COURSE OUTLINE
- Information Systems Access Control
- Security Architecture and Design
- Network and Telecommunications Security
- Information Security Management Goals
- Information Security Classification and Program Development
- Risk Management and Ethics
- Application Security
- Cryptography
- Physical Security
- Operations Security
- Business Continuity and Disaster Recovery Planning
- Threat/Vulnerability Analysis
- Incident Response
- Legal, Regulations, Compliance, and Investigations