Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Introduction
-
Governance
- Governance for Government
- Security Program Documentation
- Awareness and Training Considerations
- Governance Frameworks
- Governance, Risk, and Compliance (GRC) Tools
- Management Involvement
- Change and Configuration Management
- The Data Lifecycle
- Communication Considerations
-
Risk Management
- Confidentiality Risk Considerations
- Integrity Risk Considerations
- Availability Risk Considerations
- Privacy Risk Considerations
- Risk Assessment Frameworks
- Risk Assessment
- Risk Response
- Impact Analysis
- Third-Party Risk Management
-
Compliance
- Industry Compliance for Government
- Industry Standards
- Security Frameworks
- Security Organization Control Type 2 (SOC 2)
- NIST Cybersecurity Framework (CSF)
- Cloud Security Alliance (CSA)
- Privacy Regulations
- Security Reviews
- Cross-Jurisdictional Compliance
-
Resilient System Design
- Security Devices
- Monitoring and Detection
- Network Traffic Management
- Application Layer Security
- Availability Considerations
- Scaling Considerations
- Recovery Strategies
- Deployment Strategies
-
Secure Architecture Design
- Data States
- Data Classification for Government
- Data Labeling and Tagging
- Data Loss Prevention (DLP)
- Hybrid Infrastructures
- Third-Party Integrations
- Attack Surface Management
- Control Effectiveness
-
Security in Systems
- Hardware Assurance for Government
- Security Requirements
- Software Assurance
- Supply Chain Assurance
- Pre-Deployment Testing
- Post-Deployment Testing
- Continuous Integration/Continuous Deployment (CI/CD) Management
- Continuous Integration/Continuous Deployment (CI/CD) Testing
- End-of-Life (EOL) Considerations
-
Access, Authentication, Authorization
- Access Control Systems for Government
- Access Provision
- Rule-Based Access Control
- Role-Based Access Control (RBAC)
- Identity and Authentication
- Access Control Policies
- Monitoring and Oversight
-
Zero Trust Design
- Security Boundaries for Government
- VPN Architecture
- Segmentation
- Deperimeterization
- Access Management
- Application Programming Interface (API) Integration and Validation
- Asset Control
-
Hardware Security
- Roots of Trust for Government
- Boot Options
- Security Coprocessors
- Self-Encrypting Drives (SED)
- Host-Based Encryption
- Self-Healing Hardware
- Virtual Hardware
Requirements
- A minimum of 10 years of general IT experience, with at least 5 years dedicated to IT security for government operations
- Familiarity with governance frameworks, cryptographic techniques, and risk management strategies for government use
- Access to essential lab hardware and software, including virtualized appliances, Linux distributions, and scripting tools for government applications
35 Hours
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Trainer willing to answer questions and give bunch of examples for us to learn.
Eldrick Ricamara - Human Edge Software Philippines, Inc. (part of Tribal Group)
Course - Security Testing
It opens up a lot and gives lots of insight what security