Welcome to CYBERHYGIENE 3

Carry out or facilitate safety audits (internal, external and third-party). Apply and maintain detection and prevention measures. Implement and manage patches and vulnerabilities. Backup storage strategies - Participate in business continuity planning and exercises.

Select and determine cryptographic solutions

THE PROGRAM

  • Determine compliance and other requirements
  • Understand and apply risk management concepts
  • Risk assessment/analysis
  • Apply Supply Chain Risk Management (SCRM) concepts
  • Service level requirements
  • Standards Selection
  • Data protection methods (DRM, DLP,..)
  • Research, implement and manage engineering processes using secure design principles
  • Favoring the use of qualified products and services
  • Shared responsibility
  • Implement and manage physical security
  • Perimeter security controls
  • Control and protect access to server rooms and technical premises
  • Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
  • Internet Protocol (IP) networking (eg,Internet Protocol Security (IPSec)
  • Secure protocols and how to use them
  • Partitioning and securing interconnections (managing the Internet)
  • Wireless networks (e.g. Li-Fi, Wi-Fi, Zigbee, satellite)
  • Ensure security of Wi-Fi access networks and separation of uses (administration, use, public)
  • Key performance and risk indicators
  • Backup verification data
  • Intrusion detection and prevention
  • Security Information and Event Management(SIEM)
  • Continuous monitoring, egress, log
  • Internal security controls
  • Change management
  • Assessing the security impact of acquired software
  • Assigning the right rights to sensitive information system resources
  • Ready to Start?