This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSOS®. This course gives you a holistic view of the cyber security landscape, ongoing threats and the effective approach to keeping the entire enterprise safe and running beyond the network perimeter, third party risk, compliance to industry and regulatory requirements and having in place an effective incident response mechanism, to deal with the ever present cyber threats. The CSOS® provides a strong operational support to operationalizing the latest trends and best practices that support the Application Security and the security of the Application Ecosystem (AE)® and addressing the typical cybersecurity operation.
Who should take this course?
Cyber Security Professionals including but not limited to, Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptographer, Cryptanalyst, Security Consultant and also Application Developers, Finance Professionals, Data Center Designers/Engineers, Data Center Planners, Project Managers, Legal & Compliance Professionals, College Students & Graduates and Business Continuity Experts.
You will learn how to focus on and actively protecting the organization from cybersecurity threats and managing the risk to support the successful accomplishment of the organization’s mission by having a depth of understanding of:
Cybersecurity Governance, Risk Management, Physical IT-Related Asset management: Acquisition, Development & Maintenance, Vulnerability Identification and Management: Treating Cybersecurity Risks, Cybersecurity Incident and Crisis Management, Business Continuity Management, Organizational Structure, Human Factors and Culture, Cybersecurity Competencies and the CISO, Human Resources Cybersecurity, Application Security, Cybersecurity Considerations for the 7-Layers of the Application Ecosystem, Controls Management, Change Management, Application Ecosystem Management: Cybersecurity Day-to-Day Operations, Access Control, External Context & Supply Chain, Maintaining Situational Awareness: Monitoring & Reviewing Key Risk Indicators (KRI) and Security Service Level Agreements
Learn systems approach to planning for cyber attacks, Learn how to situate Cybersecurity in tandem with the organization’s operational resilience policies and objectives, Learn how to maintain Cybersecurity infrastructure, Learn about the Application Ecosystem’s Cybersecurity and how to actively keep the Application secured, Understand cyber security policies and procedures, Learn effective cybersecurity operation, Learn day-to-day cyber security operational management, Cyber Security human resource management, Learn how to form and manage 3rd party dependencies, Learn how to manage cybersecurity assets, Learn how to understand Cybersecurity environments and the correct response, Learn about Cybersecurity Incident and how to respond to an incident
IDCA offers a wide range of educational professional training programs geared specifically to the Cyber Security: