Course Description
Information security has changed, and vulnerabilities go far beyond technology.
The most important resource your organization has is information. But
many companies don't know how to properly protect it. Protecting
machines with technical controls is not enough. Tactical Information
Security Boot Camp provides business unit leaders, security
professionals and technologist with common reference points and
understanding of why and how to implement security activities into
business processes. You will also discover unexpected benefits that come
with correct security integration. Far too often, security is a
hindrance to productivity. Business units and security professionals
often seem to be on opposing sides. A constant friction interferes with
the company's ability to meet its goals and objectives. Security is
utilized as a "fix-it" tool only to be used AFTER an incident has
occurred. It doesn't have to be that way — cohesive strategy and
security leadership skills can actually encourage efficiency and
productivity.
Learn Truly Effective Security Practices, From Skills to Strategy
This four-day course teaches security professionals how to identify
business requirements and turn those requirements into a highly
functional, cost-effective information security management system. Led
by an expert instructor, you will dive into the intricacies of managed
security solutions. Examination of actual security incidents and
real-word scenarios are used to understand how to apply those solutions
and how to discover shortcomings within existing solutions.
One of the greatest weaknesses many organizations have is their
inability to identify and respond to security incidents. While learning
how to avoid incidents, we will teach you how effective monitoring tools
are used in concert with pre-planned security response solutions.
Learn to trigger actions that minimize both immediate and long-term
impacts of any security incident. Designed to teach security experts the
business processes required to effectively govern a corporate security
program, this course also teaches managers how to use information
gathered through security technology tools such as an IPS, Firewall, or
SIEM, to develop appropriate and timely responses to a security breach.
Get comprehensive real-world skills you can use immediately — for compliance, protection, and response.
This course will help organizations turn security into a catalyst for
better productivity by helping the students learn how take an active
role in implementing the entire security life cycle to assure the
protection of corporate information. Through discussions, group
activities and workshops the students will learn how to identify
business AND security requirements and formulate strategies to align the
requirements together. The student will learn processes and frameworks
that will enable the organization to transition from a reactive to a
proactive security position.
Take away these immediately useful skills:
- Learn how to Identify and create Business Security Objectives
- Integrate effective Security Governance in your organization
- Examine and plan for regulatory compliance in 2015 and beyond
- Relate compliance requirements to your own business security objectives
- Pinpoint and compare security performance metrics
- Learn to spot a CWE/SANS "Top 25" software security vulnerability in your company
- Tie security performance metrics to security deficiencies and solutions
- Define Security Planning for your own situation
- Integrate practical Security Planning in your own organization
- Describe IT Security Architecture development and its importance to a business
- Define IT security product functionality
- Prepare for and design IT security device management requirements
- Perform real-world Quantitative and Qualitative Risk Analysis
- Understand levels of acceptable risk within a corporation
- Determine practical Risk Response strategies
- Leverage and integrate different security control categories and types
- Determine the appropriate control selection criteria
- Understand the purpose and structure of different security frameworks
- Integrate Penetration tests and Vulnerability assessments
- Create an agile, effective incident response process for your own organization
- Learn to define and manage Change and Configuration Management
- Learn how BCP relates to and supports business objectives
Substitution & Cancellation Policy:
You may cancel or reschedule up to 21 days prior to the start date of the class at no penalty. For any cancellation or reschedule requests within 21 days, the full course tuition is still due and not eligible for refund. Any paid tuition will be credited towards a future class and must be used within 12 months.
*Partner delivered courses may be subject to different cancellation terms