Attendees will learn about the latest trends in cybersecurity methodologies and strategies. The importance of choosing a proper framework is also emphasized. Creating an implementation plan is difficult without proper guidance, so several options will be explored. Additional discussions will address how organizations prepare for assessment and monitoring challenges. Several case studies will also be discussed in detail.
Registration / Pricing Details Download BrochureCISSP, CISM, CISA, CEH, CHFI, CSAP, CSAE, CND
President & CEO - SteppingStone Solutions
Past: Adjunct Professor |Cyber Security | Risk management | Business Transformation - University of Charleston
Past: Sr. Information Security Specialist - IFC - International Finance Corporation
Past: Sr. Firewall Engineer - Department of State
Past: Sr. Security Analyst - Department of Justice
Ms. Computer Science - DePaul University
Masters Certificate in Visual Communications & Digital 3D Design - The Johns Hopkins University
Developing an enterprise cybersecurity strategy is a challenging project. There are many choices, which need to be coordinated among various elements of any organization. This course provides a broad overview of many aspects of cybersecurity trends, including frameworks, performing assessments, and selecting the best guidance available.
You will leave with an understanding of
Morning Session - Part 1
Morning Session - Part 2
Afternoon Session - Part 1
Afternoon Session - Part 2
End of Day
Morning Session - Part 1
Morning Session - Part 2
Case Study #3: Drilling Deep
Afternoon Session - Part 1
Afternoon Session - Part 2
Closing Certificate distribution End of Course
Course Program | |
---|---|
Time | Topic |
Day 1 | |
08:00 to 08:30 | Registration & Introduction |
Day 1-2 | |
08:30 to 10:30 | Session One |
10:30 to 10:40 | Coffee/Tea Break |
10:40 to 12:45 | Session Two |
12:45 to 13:30 | Lunch Break |
13:30 to 15:00 | Session Three |
15:00 to 15:10 | Coffee/Tea Break |
15:10 to 16:00 | Session Four |