Clicky

L O A D I N G

Cybersecurity

Beginners

  1. The Security Environment 
    • Threats, vulnerabilities, and
      consequences
    • Advanced persistent threats
    • The state of security today
    • Why security matters to DoD
  2. Principles of Cybersecurity
    • The interrelated components of the
      computing environment
    • Cybersecurity models (the CIA
      triad, the star model, the Parkerian
      hexad)
    • Variations on a theme: computer
      security, information security, and
      information assurance
  3. Cybersecurity Management Concepts
    • Security governance
    • Management models, roles, and
      functions
  4. Enterprise Roles and Structures
    • Information security roles and
      positions
    • Alternative enterprise structures and
      interfaces
  5. Strategy and Strategic Planning
    • Strategy
    • Strategic planning and security
      strategy
    • The information security lifecycle
    • Architecting the enterprise
  6. Security Plans and Policies
    • Levels of planning
    • Planning misalignment
    • The System Security Plan (SSP)
    • Policy development and
      implementation
  7. Laws and Regulatory Requirements
    • Timeline of U.S. laws related to
      information security
    • The Federal Information Security
      Management Act (FISMA)
  8. Security Standards and Controls
    • Security standards and controls
    • Certification and accreditation
      (C&A)
  9. Risk Management
    • Principles of risk
    • Types of risk
    • Risk strategies
    • The Risk Management Framework
      (RMF)
  10. Security Metrics and Key Performance
    Indicators (KPIs)
    • The challenge of security metrics
    • What makes a good metric
    • Approaches to security metrics
    • Metrics and FISMA

Advanced

  1. Physical Security and Environmental
    Events
    • Physical and environmental threats
    • Physical and environmental
      controls
  2. Contingency Planning
    • Developing a contingency plan
    • Understanding the different types of
      contingency plan
    • Responding to events
  3. Security Education, Training, and
    Awareness
    • Human factors in security
    • Developing and implementing a
      security training plan
    • Cross-domain training (IT and other
      security domains)
  4. Managing information security across
    the DoD enterprise (1)
    • The purpose of certification and
      accreditation
    • Trends in certification and
      accreditation
  5. Managing information security across
    the DoD enterprise (2)
    • The strategic direction of DoD IT
      and information security
    • Responsibilities within the DoD
      enterprise
  6. The future of cybersecurity
    • Key future uncertainties
    • Possible future scenarios
    • How to apply what you’ve learned
tvisha technologies click to call
Request A Call Back