Course Outline

  • Introduction
  • Governance
    • Governance for Government
    • Security Program Documentation
    • Awareness and Training Considerations
    • Governance Frameworks
    • Governance, Risk, and Compliance (GRC) Tools
    • Management Involvement
    • Change and Configuration Management
    • The Data Lifecycle
    • Communication Considerations
  • Risk Management
    • Confidentiality Risk Considerations
    • Integrity Risk Considerations
    • Availability Risk Considerations
    • Privacy Risk Considerations
    • Risk Assessment Frameworks
    • Risk Assessment
    • Risk Response
    • Impact Analysis
    • Third-Party Risk Management
  • Compliance
    • Industry Compliance for Government
    • Industry Standards
    • Security Frameworks
    • Security Organization Control Type 2 (SOC 2)
    • NIST Cybersecurity Framework (CSF)
    • Cloud Security Alliance (CSA)
    • Privacy Regulations
    • Security Reviews
    • Cross-Jurisdictional Compliance
  • Resilient System Design
    • Security Devices
    • Monitoring and Detection
    • Network Traffic Management
    • Application Layer Security
    • Availability Considerations
    • Scaling Considerations
    • Recovery Strategies
    • Deployment Strategies
  • Secure Architecture Design
    • Data States
    • Data Classification for Government
    • Data Labeling and Tagging
    • Data Loss Prevention (DLP)
    • Hybrid Infrastructures
    • Third-Party Integrations
    • Attack Surface Management
    • Control Effectiveness
  • Security in Systems
    • Hardware Assurance for Government
    • Security Requirements
    • Software Assurance
    • Supply Chain Assurance
    • Pre-Deployment Testing
    • Post-Deployment Testing
    • Continuous Integration/Continuous Deployment (CI/CD) Management
    • Continuous Integration/Continuous Deployment (CI/CD) Testing
    • End-of-Life (EOL) Considerations
  • Access, Authentication, Authorization
    • Access Control Systems for Government
    • Access Provision
    • Rule-Based Access Control
    • Role-Based Access Control (RBAC)
    • Identity and Authentication
    • Access Control Policies
    • Monitoring and Oversight
  • Zero Trust Design
    • Security Boundaries for Government
    • VPN Architecture
    • Segmentation
    • Deperimeterization
    • Access Management
    • Application Programming Interface (API) Integration and Validation
    • Asset Control
  • Hardware Security
    • Roots of Trust for Government
    • Boot Options
    • Security Coprocessors
    • Self-Encrypting Drives (SED)
    • Host-Based Encryption
    • Self-Healing Hardware
    • Virtual Hardware

Requirements

  • A minimum of 10 years of general IT experience, with at least 5 years dedicated to IT security for government operations
  • Familiarity with governance frameworks, cryptographic techniques, and risk management strategies for government use
  • Access to essential lab hardware and software, including virtualized appliances, Linux distributions, and scripting tools for government applications
 35 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories