Course Outline

Introduction

  • Overview of cybersecurity concepts and definitions
  • Distinguishing between information security and cybersecurity

Security Architecture and Frameworks

  • Enterprise architecture framework for government
  • OSI model and related definitions
  • Defense in depth strategies
  • Information flow control mechanisms
  • Isolation and segmentation practices
  • Logging, monitoring, and detection processes
  • Encryption techniques and tools for secure communications

Security of Assets (Networks, Systems, Applications, and Data)

  • Identity management systems
  • Risk assessment methodologies
  • Vulnerability management procedures
  • Penetration testing protocols
  • Network security measures
  • Operating system security configurations
  • Application security practices
  • Data security and protection strategies

Security Operations and Responses

  • Differentiating between events and incidents
  • Legal and regulatory compliance requirements for government
  • Digital forensics techniques
  • Incident categories and classifications
  • Business continuity and disaster recovery plans
  • Incident response and handling procedures

Common Challenges with Emerging Technologies

  • Current threat landscape for government
  • Advanced persistent threats (APTs) and their impacts
  • Risks associated with mobile technology
  • Consumerization of IT, including IoT, Big Data, and AI
  • Risks and challenges in cloud computing environments

Summary and Next Steps

Requirements

  • n/a

Audience

  • Information Technology professionals for government
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories