Course Outline

Introduction

  • Overview of Cybersecurity Concepts and Definitions
  • Distinguishing Information Security from Cybersecurity

Security Architecture and Frameworks

  • Enterprise Architecture Framework
  • OSI Model and Definitions
  • Defense in Depth Strategy
  • Information Flow Control Mechanisms
  • Isolation and Segmentation Techniques
  • Logging, Monitoring, and Detection Systems
  • Encryption Techniques and Tools for Government Use

Security of Assets (Networks, Systems, Applications, and Data)

  • Identity Management Practices
  • Risk Assessment Methodologies
  • Vulnerability Management Strategies
  • Penetration Testing Procedures
  • Network Security Protocols for Government Networks
  • Operating System Security Enhancements
  • Application Security Measures
  • Data Security Policies and Practices

Security Operations and Responses

  • Differentiating Between Events and Incidents
  • Legal and Regulatory Compliance Requirements for Government Entities
  • Digital Forensics Techniques
  • Incident Categories and Classification
  • Business Continuity and Disaster Recovery Planning for Government Agencies
  • Incident Response and Handling Procedures for Government Operations

Common Challenges with Emerging Technologies

  • Evolving Threat Landscape for Government Systems
  • Advanced Persistent Threats (APTs) in the Public Sector
  • Risks Associated with Mobile Technology for Government Use
  • Consumerization of IT: IoT, Big Data, and AI Risks for Government Operations
  • Potential Risks and Mitigation Strategies for Cloud Computing in Government Environments

Summary and Next Steps

Requirements

Audience

  • Information technology professionals for government
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories