WELCOME TO CYBER HYGIENE 4

Establish information and asset management requirements

PROGRAM

  • Identify and classify information and assets
  • Understanding cryptanalytic attack methods
  • Session management
  • Identity registration, verification and establishment
  • Federated Identity Management (FIM)
  • Credential management systems
  • Just-in-time (JIT)
  • Federated identity with a third-party service
  • Implement and manage authorization mechanisms
  • Set up authentication systems
  • Design and validate evaluation, testing and verification strategies
  • Perform security testing
  • Understand and participate in change management processes
  • Understand and integrate security into the software development life cycle (SDLC)
  • Evaluate software security effectiveness
  • Define and apply secure coding guidelines and standards

Ready to Start?