Security Management Level 3 |
Module 1: Information and Cyber Security Management |
|
Securing Your Information |
|
00:10:00 |
|
Introduction to Risk Management for Cyber Security |
|
00:20:00 |
|
Risk Management Principles for Cyber Security |
|
00:10:00 |
|
Variety in Risk Information |
|
00:10:00 |
Module 2: Component-driven and System-driven Approaches to Risk Management |
|
Component-driven and System-driven Approaches to Risk Management |
|
00:10:00 |
|
Understanding Component-Driven Risk Management |
|
00:10:00 |
|
Understanding System-driven Risk Management |
|
00:15:00 |
Security Management Level 4 |
Module 3: Penetration Testing |
|
Penetration Testing |
|
00:20:00 |
Module 4: Security Management |
|
Security Management Planning and Implementation |
|
00:20:00 |
|
The Basics of Security Management |
|
00:15:00 |
Module 5: Security Policy Decisions |
|
Improving Security Policy Decisions with Models |
|
00:30:00 |
Security Management Level 5 |
Module 6: Security Management Practices |
|
Security Management Practices |
|
00:20:00 |
|
How to Build a Security Management Team |
|
00:05:00 |
Module 7: Security Governance |
|
Introduction to Security Governance |
|
00:10:00 |
|
Security Governance, Enabling Sensible Risk Management Decisions & Communication |
|
00:15:00 |
Module 8: Secure Development and Deployment Principles |
|
Secure Development and Deployment Principles |
|
01:10:00 |