Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Supporting IT Governance & Risk Management

  • Identify the Importance of IT Governance & Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Lesson 2

Leveraging Collaboration to Support Security

  • Facilitate Collaboration across Business Units
  • Secure Communications & Collaboration Solutions

Lesson 3

Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Their Effects on the Enterprise
  • Analyze Scenarios to Secure the Enterprise

Lesson 5

Implementing Cryptographic Techniques

  • Select Cryptographic Techniques
  • Implement Cryptography

Lesson 7

Implementing Security Controls for Mobile Devices

  • Implement Mobile Device Management
  • Address Security & Privacy Concerns for Mobile Devices

Lesson 9

Implementing Security in the Systems & Software Development Lifecycle

  • Implement Security throughout the Technology Lifecycle
  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

Lesson 11

Conducting Security Assessments

  • Select Security Assessment Methods
  • Perform Security Assessments with Appropriate Tools

Lesson 4

Integrating Advanced Authentication and Authorization Techniques

  • Implement Authentication & Authorization Technologies
  • Implement Advanced Identity & Access Management

Lesson 6

Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualize Servers and Desktops
  • Protect Boot Loaders

Lesson 8

Implementing Network Security

  • Plan Deployment of Network Security Components & Devices
  • Plan Deployment of Network-Enabled Devices
  • Implement Advanced Network Design
  • Implement Network Security Controls

Lesson 10

Integrating Assets in a Secure Enterprise Architecture

  • Integrate Standards & Best Practices in Enterprise Security
  • Select Technical Deployment Models
  • Integrate Cloud-Augmented Security Services
  • Secure the Design of the Enterprise Infrastructure
  • Integrate Data Security in the Enterprise Architecture
  • Integrate Enterprise Applications in a Secure Architecture

Lesson 12

Responding to and Recovering from Incidents

  • Prepare for Incident Response & Forensic Investigations
  • Conduct Incident Response & Forensic Analysis

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

In hac habitasse platea dictumst. Vivamus adipiscing fermentum quam volutpat aliquam. Integer et elit eget elit facilisis tristique.

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.