Course Outline
Welcome & Introduction - Course Overview and Objectives
The Information Security Landscape
- Defining information security: Confidentiality, Integrity, Availability (CIA triad)
- Data classifications and sensitivity levels for government
- Understanding common cyber threats (malware, phishing, social engineering, etc.) in the public sector
- Real-world case studies of information security breaches relevant to government operations
Building Your Information Security Arsenal
- Essential security controls: Access control, encryption, firewalls, intrusion detection for government systems
- Implementing secure practices: Password management, multi-factor authentication (MFA), data backups in a government context
- Understanding security frameworks and standards (NIST, ISO 27001) applicable to public sector organizations
Navigating the Information Security Career Landscape
- Overview of the diverse career paths available in the public sector (Security Management, Governance, Risk and Compliance (GRC), Security Analyst, Penetration Tester, Incident Responder, etc.)
- Understanding the skills and qualifications required for different roles within government agencies
- Exploring educational and certification options for government professionals
- Q&A with industry professionals from the public sector (optional)
Specialising in the Security Realm
- Deep dive into specific security domains: Network security, cloud security, application security, data security for government systems
- Emerging trends and future directions in information security for government - AI, Culture Change
- Career growth and advancement opportunities within public sector organizations
Hands-on Activity: Applying Security Concepts
- Interactive scenario-based exercise to apply theoretical knowledge in a government context
- Group discussion and collaborative problem-solving for government scenarios
Charting Your Course: Actionable Steps
- Developing a personalized career roadmap for government professionals
- Identifying resources for further learning and networking within the public sector
- Q&A and open discussion focusing on government-specific challenges and opportunities
Course Wrap-up and Feedback
- Key takeaways and concluding remarks for government participants
- Feedback form and evaluation to improve future government training programs
Requirements
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.