Laserfiche WebLink
*Secure network architecture design (e.g., segmentation, non IP protocols, IP) <br />*Network attacks <br />4. Access and Identity Management (5 hours) (Managing identity and controlling access) <br />•Authentication and identification of devices and people <br />*Logical and physical assets control <br />•Access and identity provisioning lifecycle (e.g,, provisioning review) <br />*Access control attacks <br />*Third party identity services (e.g., on the premises) <br />5. Security Operations (5 hours) (Investigations, disaster recovery, incident management, foundational <br />concepts) <br />•Requirements, support and investigations <br />*Monitoring and logging activities <br />•Resource provisioning <br />•Concepts of foundational security operations <br />•Techniques in research protection <br />•Managing incidents <br />•Ensuring prevention <br />•Vulnerability and patch management <br />•Processes in change management <br />•Strategies in recovery <br />•Processes and plans in disaster recovery <br />•Planning and exercises in business continuity <br />•Physical security <br />• Concerns with personal safety <br />6. Software Development Security (5 hours) (Applying, understanding and enforcing software security) <br />•Software development lifecycle security <br />•Security controls in the development environment <br />*Effectiveness in software security <br />*Acquired software security impact <br />Testing Security Assessment (5 hours) ( Performing, designing, and analyzing security testing) <br />*Test and assessment strategies <br />*Data process security (e.g„ operational controls and management) <br />*Testing security control <br />*Test outputs (e.g., manual, automated) <br />*Vulnerabilities in security architectures <br />Updated 091323 83 <br />