Course Overview

Category / Topic: Cybersecurity, IT Governance & Compliance, Information Systems Management

Language: Czech

Learning Format: Online

€1,600
-- or --

Request Your Own Session

We’ll get back to you with the best tailored offer.

{"title":"OPEN Enterprise security architecture","shortDescription":"The course provides participants with a comprehensive overview for designing security architecture within a corporate security program. It includes strategic planning, architecture design, implementation, and management according to defined policies. Topics include an approach to cybersecurity, asset protection (data, applications, and networks), identity management, and monitoring security metrics control. Through practical exercises and demonstrations, participants will learn to prepare deliverables and sustainable concepts and models that meet security standards.","description":"<h2>Master the Essentials of Enterprise Security Architecture</h2>\n\n<p>Enhance your knowledge and capabilities in enterprise security with our comprehensive course that covers critical aspects of Security Governance, Technology Architecture, and Operations. Perfect for professionals looking to strengthen their organization's security posture.</p>\n\n<ul>\n <li><strong>Target Audience:</strong> IT professionals, security analysts, and management personnel responsible for enterprise security.</li>\n <li><strong>Course Duration:</strong> 2 days</li>\n <li><strong>Course Format:</strong> Online (join virtually)</li>\n <li><strong>Certification:</strong> Yes</li>\n</ul>\n\n<h3>Detailed Course Description:</h3>\n<ul>\n <li><strong>Skills Gained:</strong> Participants will acquire essential skills in security governance, architecture, and operations, including policy development and automation techniques.</li>\n <li><strong>Course Outline:</strong>\n <ul>\n <li>General Description of an Enterprise Security Program</li>\n <li>Security Governance: roles, principles, procedures, standards, and regulations</li>\n <li>Security Technology Architecture: implementing Access Control Framework (PDP/PEP)</li>\n <li>Security Operations: components, processes, and metrics</li>\n <li>Toward Policy-Driven Security Architecture: models and automation methods</li>\n <li>Conclusions and Recommendations: practical advice for securing ESA</li>\n <li>A Glossary of Resources: examples of GRC tools</li>\n <li>Security Architecture Checklist: practical demonstration</li>\n </ul>\n </li>\n <li><strong>Bonuses:</strong> Access to supplementary materials and insights from expert instructors from ICT Pro.</li>\n</ul>\n\n<p>Don't miss this opportunity to fortify your skill set in enterprise security! Sign up today and transform your approach to security architecture.</p>","rating":0,"reviewCount":0,"reviews":[]}