Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Introduction
-
Governance
- Governance for Government
- Security Program Documentation for Government
- Awareness and Training Considerations for Government
- Governance Frameworks for Government
- Governance, Risk, and Compliance (GRC) Tools for Government
- Management Involvement in Government Operations
- Change and Configuration Management for Government
- The Data Lifecycle for Government
- Communication Considerations for Government
-
Risk Management
- Confidentiality Risk Considerations for Government
- Integrity Risk Considerations for Government
- Availability Risk Considerations for Government
- Privacy Risk Considerations for Government
- Risk Assessment Frameworks for Government
- Risk Assessment for Government
- Risk Response for Government
- Impact Analysis for Government
- Third-Party Risk Management for Government
-
Compliance
- Industry Compliance for Government
- Industry Standards for Government
- Security Frameworks for Government
- Security Organization Control Type 2 (SOC 2) for Government
- NIST Cybersecurity Framework (CSF) for Government
- Cloud Security Alliance (CSA) for Government
- Privacy Regulations for Government
- Security Reviews for Government
- Cross-Jurisdictional Compliance for Government
-
Resilient System Design
- Security Devices for Government
- Monitoring and Detection for Government
- Network Traffic Management for Government
- Application Layer Security for Government
- Availability Considerations for Government
- Scaling Considerations for Government
- Recovery Strategies for Government
- Deployment Strategies for Government
-
Secure Architecture Design
- Data States in Government Systems
- Data Classification for Government
- Data Labeling and Tagging for Government
- Data Loss Prevention (DLP) for Government
- Hybrid Infrastructures for Government
- Third-Party Integrations for Government
- Attack Surface Management for Government
- Control Effectiveness for Government
-
Security in Systems
- Hardware Assurance for Government
- Security Requirements for Government
- Software Assurance for Government
- Supply Chain Assurance for Government
- Pre-Deployment Testing for Government
- Post-Deployment Testing for Government
- Continuous Integration/Continuous Deployment (CI/CD) Management for Government
- Continuous Integration/Continuous Deployment (CI/CD) Testing for Government
- End-of-Life (EOL) Considerations for Government
-
Access, Authentication, Authorization
- Access Control Systems for Government
- Access Provision for Government
- Rule-Based Access Control for Government
- Role-Based Access Control (RBAC) for Government
- Identity and Authentication for Government
- Access Control Policies for Government
- Monitoring and Oversight for Government
-
Zero Trust Design
- Security Boundaries for Government
- VPN Architecture for Government
- Segmentation for Government
- Deperimeterization for Government
- Access Management for Government
- Application Programming Interface (API) Integration and Validation for Government
- Asset Control for Government
-
Hardware Security
- Roots of Trust for Government
- Boot Options for Government
- Security Coprocessors for Government
- Self-Encrypting Drives (SED) for Government
- Host-Based Encryption for Government
- Self-Healing Hardware for Government
- Virtual Hardware for Government
Requirements
- A minimum of 10 years of general IT experience, with at least 5 years dedicated to IT security for government operations.
- Familiarity with governance frameworks, cryptographic techniques, and risk management strategies for government use.
- Access to essential lab hardware and software, including virtualized appliances, Linux distributions, and scripting tools for government applications.
35 Hours
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Trainer willing to answer questions and give bunch of examples for us to learn.
Eldrick Ricamara - Human Edge Software Philippines, Inc. (part of Tribal Group)
Course - Security Testing
It opens up a lot and gives lots of insight what security