Secure by Design
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
This course will show you how security and privacy can be designed, managed, and maintained within a development lifecycle. This course, is updated with the latest OWASP Top 10 The course includes technical practice simulation CYRIN labs.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Learn about useful system design tools
- Discover resources to help introduce and use secure design and development best practices
- Understand the main Secure Development Lifecycle (SDLC) Models, and their principal differences
- Be able to choose which SDLC model is most appropriate in a given situation.
- Learn how to apply secure development techniques from the initial design stage and throughout a development lifecycle
- Understand the latest (2021) OWASP vulnerabilities and how to counter/mitigate them
- Learn Threat Modelling methodologies and techniques
- Understand the benefits of code review
- Understand various testing strategies
- Learn about encryption, securing and compromising passwords and metadata
- An introduction to the classification of security flaws and application security
-
COURSE AUDIENCE
This course is made for :
- Security Consultants
- Perimeter Security
- Chief Security Officers
- Network Administrators
- Infrastructure Architects
- Security Professionals
- Systems Engineers
- Network Administrators
- IT Professionals
-
COURSE OUTLINE
Day One
- Concept of Security Architecture
- System and Information Integrity
Day Two
- Encryption
- Preparation for Design
Day Three
- Data Classifications
- Data Confidentiality and Integrity
Day Four
- Configuration Management
- Physical and Environmental Protection
Day Five
- Incident Response
Keyword
Training Subject
Training Location