Course Overview
|
Course Synopsis
|
As IT continues to grow at a rapid pace and plays a significant role in automating the functions of the enterprise, Information Security has taken on an unparalleled significance around the world. Yet the understanding and implementation of Information Security in Pakistan remains fundamentally poor.
This course is based on 20 years vast experience of the instructor in IT, including 10 years as an Information Security practioner in Pakistan. The instructor has experience of working on security assessment and implementation of a wide variety of organizations in Pakistan ranging from small sized organizations to large ones, and banking organizations to telecoms, enterprise, and government setups.
As a result of the valuable experience gained from the security assessment of over 50 organizations of all types and sizes in Pakistan, the conclusion is inevitable that the Information Security posture in the country is deficient.
This course is based on a practical and realistic view of how to solve the inherent problems in our organizations and how to achieve a deep, lasting and meaningful security transformation, meeting International best-practices.
This course is based on the highly successful model already implemented by the course instructor through his Information Security consulting organization – Delta Tech. Hence the course is based on a real and field-tested security transformation methodology and framework which is unique in Pakistan’s industry.
The course instructor is convinced that Pakistan’s Information Security deficiencies require a surgical resolution, and if not solved in a methodical manner at the enterprise level through an Information Security transformation program, the Information Security program will always remain severely deficient.
This course is an outstanding opportunity for the students to learn of a highly successful, transformational, practical, pioneering, and unique approach to bring about a security transformation in the organizations that they will work for or are already working for.
The course offers knowledge, skills, and information that is distilled from over 20 years of field experience in IT and Information Security and cannot be taught by any textbook. By taking this course, the students will readily become Security Transformation change agents, helping the instructor in his mission to effectively orchestrate the Information Security posture in the country bringing it in line with International thresholds and aligned with International best-practices.
The course offers a number of demos of real-world security tools which will quickly equip the students to arm themselves with very valuable knowledge and skills which is unparalleled in every previous course on Information Security in Pakistan.
In order to bring about the desired transformation all enterprises and organizations in Pakistan, Nahil Mahmood has founded the Pakistan Cyber Security Association (PCSA) of which he is also Chairman. The purpose of this organization is to fill the gap of security eco-system by bringing together all security professionals, organizations and entities onto a collective and collaborative platform for the good of the country’s Information Security posture.
|
Course Learning Outcomes
|
After studying this course, the students will be able to:
- Define Information security and its different aspects
- Describe the need of information security
- List the key players and their roles in information security
- Describe OSI security architecture
- Understand the basic mechanism of Information Hardening
- Identify key challenges in information security implementation
- Describe the status of information security in Pakistan
- Draw the diagrams of typical IT network and its architecture
- Use the techniques of security hardening of IT assets
- Define vulnerability and vulnerability management
- Define security engineering and its related concepts
- Describe the information security governance, its building blocks, and how it is implemented
- Implement information security testing and validation
- Understand how a security transformation project may be set up for failure
- Solve the inherent problems in our organizations and how to achieve a deep, lasting and meaningful security transformation, meeting International best-practices.
|
Course Calendar
|
|
Week 01
1
|
INTRODUCTION TO THE COURSE
|
2
|
Ch01.WHAT IS INFORMATION SECURITY ?
|
3
|
Ch01.WHY IS INFORMATION SECURITY NEEDED ?
|
4
|
Ch01.WHO IS INFORMATION SECURITY FOR ?
|
5
|
Ch01.HOW IS INFORMATION SECURITY IMPLEMENTED ?
|
6
|
Ch01.WHO ARE THE PLAYERS IN INFORMATION SECURITY ?
|
7
|
Ch01.WHAT ARE THE FOUR LAYERS OF INFORMATION SECURITY TRANSFORMATION FRAMEWORK ?
|
8
|
Ch01.WHAT IS INFORMATION SECURITY HARDENING ?
|
9
|
Ch01.WHAT IS INFORMATION SECURITY GOVERNANCE ?
|
10
|
Ch01.WHAT IS THE DIFFERENCE BETWEEN AN INFORMATION SECURITY POLICY, SOP, AND GUIDELINE ?
|
11
|
Ch01.WHAT IS AN INFORMATION SECURITY PROGRAM ?
|
12
|
Ch01.WHAT IS THE ROLE OF PEOPLE, PROCESS, AND TECHNOLOGY IN INFORMATION SECURITY ?
|
13
|
Ch01.WHAT IS THE ROLE OF AN INFORMATION SECURITY MANAGER ?
|
14
|
Ch01.WHAT IS INFORMATION SECURITY AWARENESS ?
|
15
|
Ch01.WHAT ARE THE LEADING INFORMATION SECURITY STANDARDS, AND FRAMEWORKS ?
|
16
|
Ch01.WHAT IS INFORMATION SECURITY RISK ?
|
17
|
Ch01.WHAT IS MANAGEMENT COMMITMENT ?
|
Week 02
18
|
Ch01.WHOSE RESPONSIBILITY IS IMPLEMENTATION OF INFORMATION SECURITY ?
|
19
|
Ch01.WHAT CAN HAPPEN IF INFORMATION SECURITY IS NOT IMPLEMENTED (CYBER SECURITY BREACHES)?
|
20
|
Ch01.WHAT ARE THE CHALLENGES OF INFORMATION SECURITY IMPLEMENTATION ?
|
21
|
Ch01.WHAT IS THE ROLE OF A REGULATOR ?
|
22
|
Ch01.WHAT IS THE STATUS OF INFORMATION SECURITY IN PAKISTAN ?
|
23
|
Ch01.WHAT IS THE SOLUTION FOR IMPROVEMENT OF INFORMATION SECURITY IN PAKISTAN ?
|
24
|
Ch02.WHAT DOES THE TYPICAL ENTERPRISE IT NETWORK LOOK LIKE ?
|
25
|
Ch02.WHAT ARE THE MAJOR COMPONENTS OF THE ENTERPRISE IT NETWORK ?
|
26
|
Ch02.WHAT IS THE OSI SECURITY ARCHITECTURE ?
|
27
|
Ch02.THE NEW FRONTIERS OF ENTERPRISE IT: CLOUD, MOBILE, SOCIAL, IOT
|
28
|
Ch02.VIRTUALIZATION AND ENTERPRISE SECURITY
|
29
|
Ch02.CASE STUDY OF ENTERPRISE - SMALL ORGANIZATION
|
30
|
Ch02.CASE STUDY OF ENTERPRISE - MEDIUM SIZED ORGANIZATION
|
31
|
Ch02.CASE STUDY OF ENTERPRISE - LARGE SIZED ORGANIZATION
|
32
|
Ch02.WHAT IS THE TYPICAL STRUCTURE OF AN IT TEAM ?
|
33
|
Ch02.WHAT ARE THE OBJECTIVES AND KPIs OF A CIO AND IT TEAM ?
|
34
|
Ch02.HOW DO THE IT TEAM INTERACT WITH OTHER STAKEHOLDERS IN THE ORGANIZATION ?
|
35
|
Ch02.SECURITY OVERLAY OF AN ENTERPRISE ARCHITECTURE - I (COMPONENTS)
|
Week 03
36
|
Ch02.SECURITY OVERLAY OF AN ENTERPRISE ARCHITECTURE - II (TRAFFIC FLOWS)
|
37
|
Ch02.SECURITY OVERLAY OF AN ENTERPRISE ARCHITECTURE - III (GENERAL SECURITY DESIGN)
|
38
|
Ch02.WHAT IS HIGH AVAILABILITY (HA) ?
|
39
|
Ch02.HIGH AVAILABILITY DESIGN
|
40
|
Ch02.HOW IS SITE REDUNDANCY INCORPORATED INTO ENTERPRISE NETWORK DESIGN ?
|
41
|
Ch02.HIGH AVAILABILITY AND REDUNDANCY CASE STUDY
|
42
|
Ch02.BACKUP STRATEGIES
|
43
|
Ch02.WHAT IS THE ROLE OF SECURITY TOOLS IN SECURING THE ENTERPRISE ARCHITECTURE ?
|
44
|
Ch02.TYPICAL SECURITY TOOLS USED IN AN ENTERPRISE IT NETWORK - PART 1
|
45
|
Ch02.TYPICAL SECURITY TOOLS USED IN AN ENTERPRISE IT NETWORK - PART 2
|
46
|
Ch02.WHAT DOES THE TERM "BOX SECURITY" MEAN ?
|
47
|
Ch02.WHAT IS THE BEST APPROACH TO SECURE THE IT ENTERPRISE ARCHITECTURE ?
|
48
|
Ch02.WHAT IS DISASTER RECOVERY (DR) ?
|
49
|
Ch02.WHAT IS BUSINESS CONTINUITY ?
|
50
|
Ch02.HOW IS DR ACCOMODATED INTO THE ENTERPRISE ARCHITECTURE -PART 1?
|
51
|
Ch02.HOW IS DR ACCOMODATED INTO THE ENTERPRISE ARCHITECTURE -PART 2?
|
52
|
Ch02.WHAT IS THE ROLE OF AN IT ASSET IN SECURING THE ORGANIZATION ?
|
53
|
Ch02.HOW TO DETERMINE SECURITY POSTURE OF AN ORGANIZATION ?
|
Assignment No. 1
Week 04
54
|
Ch03.HOW DO YOU DRIVE A SUCCESSFUL INFORMATION SECURITY TRANSFORMATION ?
|
55
|
Ch03.DIFFERENCE BETWEEN SECURITY HARDENING & PATCHING
|
56
|
Ch03.SECURITY HARDENING STRATEGY
|
57
|
Ch03.PREREQUISITES FOR THE SECURITY HARDENING PROGRAM
|
58
|
Ch03.WHO WILL CONDUCT THE SECURITY HARDENING ?
|
59
|
Ch03.WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 1)
|
60
|
Ch03.WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 2)
|
61
|
Ch03.WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 3)
|
62
|
Ch03.A LOOK AT CIS SECURITY BENCHMARKS-PART 1
|
63
|
Ch03.A LOOK AT CIS SECURITY BENCHMARKS-PART 2
|
64
|
Ch03.A LOOK AT CIS SECURITY BENCHMARKS-PART 3
|
65
|
Ch03.A LOOK AT CIS SECURITY BENCHMARKS-PART 4
|
66
|
Ch03.A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 1
|
67
|
Ch03.A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 2
|
68
|
Ch03.A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 3
|
69
|
Ch03.A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 4
|
70
|
Ch03.COMPARISON OF CIS SECURITY BENCHMARKS VERSUS DISA STIGS
|
Quiz No. 1
Week 05
71
|
Ch03.CASE STUDY - SECURITY HARDENING - WINDOWS SERVER 2012 R2
|
72
|
Ch03.CASE STUDY - SECURITY HARDENING - LINUX SERVER
|
73
|
Ch03.CASE STUDY - SECURITY HARDENING - SOLARIS SERVER
|
74
|
Ch03.CASE STUDY - SECURITY HARDENING - APACHE SERVER
|
75
|
Ch03.CASE STUDY - SECURITY HARDENING - ORACLE SOLARIS SERVER
|
76
|
Ch03.CASE STUDY - SECURITY HARDENING - MS SQL SERVER
|
77
|
Ch03.CASE STUDY - SECURITY HARDENING - ORACLE DB SERVER
|
78
|
Ch03.CASE STUDY SECURITY HARDENING - WINDOWS 8 WORKSTATION
|
79
|
Ch03.CASE STUDY SECURITY HARDENING - WINDOWS 10 WORKSTATION
|
80
|
Ch03.CASE STUDY SECURITY HARDENING - MS EXCHANGE
|
81
|
Ch03.CASE STUDY SECURITY HARDENING ACTIVE DIRECTORY (AD)
|
82
|
Ch03.CASE STUDY SECURITY HARDENING - MS INTERNET EXPLORER BROWSER
|
83
|
Ch03.CASE STUDY SECURITY HARDENING - GOOGLE BROWSER
|
84
|
Ch03.CASE STUDY SECURITY HARDENING - MOZILLA FIREFOX
|
85
|
Ch03.CASE STUDY SECURITY HARDENING - NETWORK FW
|
87
|
Ch03.CASE STUDY SECURITY HARDENING - NETWORK ROUTERS
|
86
|
Ch03.CASE STUDY SECURITY HARDENING - NETWORK SWITCHES LAYER 2
|
88
|
Ch03.CASE STUDY SECURITY HARDENING - NETWORK WLAN CONTROLLER
|
Week 06
89
|
Ch03.CASE STUDY SECURITY HARDENING - NETWORK LAYER 3 SWITCH
|
90
|
Ch03.CASE STUDY SECURITY HARDENING - VMWARE
|
91
|
Ch03.CASE STUDY SECURITY HARDENING - CLOUD - AMAZON WEB SERVICES
|
92
|
Ch03.SOFTWARE SECURITY HARDENING FUNDAMENTALS-OWASP SAMM-1
|
93
|
Ch03.SOFTWARE SECURITY HARDENING FUNDAMENTALS-OWASP SAMM-2
|
94
|
Ch03.SECURITY HARDENING OF SOFTWARE APPLICATIONS - INTRODUCTION
|
95
|
Ch03.CASE STUDY SECURITY HARDENING - ASP.NET VERSION 4
|
96
|
Ch03.CASE STUDY SECURITY HARDENING - PHP VERSION X
|
97
|
Ch03.CASE STUDY SECURITY HARDENING - ASP.NET MVC FRAMEWORK
|
98
|
Ch03.CASE STUDY SECURITY HARDENING SHAREPOINT APPLICATIONS
|
99
|
Ch03.CASE STUDY SECURITY HARDENING - C APPLICATIONS
|
100
|
Ch03.CASE STUDY SECURITY HARDENING - C++ APPLICATIONS
|
101
|
Ch03.CASE STUDY SECURITY HARDENING - JAVA APPLICATIONS
|
102
|
Ch03.CASE STUDY SECURITY HARDENING PERL APPLICATIONS
|
103
|
Ch03.CASE STUDY SECURITY HARDENING - MOBILE DEVICES - ANDROID
|
104
|
Ch03.CASE STUDY SECURITY HARDENING - MOBILE DEVICES - IOS
|
105
|
Ch03.SECURITY HARDENING OF ASTERISK VOIP - PART 1
|
Graded Discussion
Week 07
106
|
Ch03.SECURITY HARDENING OF ASTERISK VOIP - PART 2
|
107
|
Ch03.VERSION CONTROL FOR IT ASSETS
|
108
|
Ch03.SOFTWARE VERSION CONTROL BEST PRACTICES
|
109
|
Ch03.SECURITY HARDENING - SECURE SOFTWARE IMAGES
|
110
|
Ch03.MANUAL AND AUTOMATED WORK IN SECURITY HARDENING
|
111
|
Ch03.QUALYS DEMO - SECURITY HARDENING
|
112
|
Ch03.QUALYS DEMO - SECURITY HARDENING II
|
113
|
Ch03.SECURITY HARDENING LIFECYCLE - MAINTAINING AN INTEGRATED AND CURRENT PROGRAM
|
114
|
Ch03.HOW TO SECURITY HARDEN IT ASSETS FOR WHICH BENCHMARK OR STIG IS NOT AVAILABLE
|
115
|
Ch04.QUALYS POLICY LIBRARIES
|
116
|
Ch04.SECURITY HARDENING FOR OUTSOURCED IT ASSETS
|
117
|
Ch04.WHAT IS VULNERABILITY MANAGEMENT (VM) ?
|
118
|
Ch04.WHAT ARE THE STEPS IN A VULNERABILITY MANAGEMENT LIFECYCLE ?
|
119
|
Ch04.WHY IS SOFTWARE INSECURE ?
|
120
|
Ch04.WHY IS A VULNERABILITY MANAGEMENT PROGRAM REQUIRED ?
|
121
|
Ch04.WHAT IS CVE, AND VULNERABILITY BULLETIN ?
|
122
|
Ch04.WHAT IS AN EXPLOIT ?
|
123
|
Ch04.IMPORTANCE OF AN EFFECTIVE VULNERABILITY MANAGEMENT PROGRAM AT STAGE 2
|
Quiz No. 2
Week 08
124
|
Ch04.CASE STUDY - HOW SYSTEM VULNERABILITIES PLAYED A PART IN SECURITY BREACH ? (PART 1)
|
125
|
Ch04.CASE STUDY - HOW SYSTEM VULNERABILITIES PLAYED A PART IN SECURITY BREACH ? (PART 2)
|
126
|
Ch04.BEST PRACTICES FOR APPLYING SECURITY PATCHES
|
127
|
Ch04.WHO CONDUCTS THE VULNERABILITY MANAGEMENT ?
|
128
|
Ch04.VULNERABILITY SCANNING TOOLS - NESSUS FEATURES
|
129
|
Ch04.VULNERABILITY SCANNING TOOLS - QUALYS FEATURES
|
130
|
Ch04.CASE STUDY - NESSUS DEMO - PART 1
|
131
|
Ch04.CASE STUDY - NESSUS DEMO - PART 2
|
132
|
Ch04.CASE STUDY - NESSUS DEMO - PART 3
|
133
|
Ch04.CASE STUDY - QUALYS DEMO - PART 1
|
134
|
Ch04.CASE STUDY - QUALYS DEMO - PART 2
|
135
|
Ch04.CASE STUDY - QUALYS DEMO - PART 3
|
136
|
Ch04.HOW DO VULNERABILITY MANAGEMENT SCANNERS WORK ?
|
137
|
Ch04.QUALYS WEB APPLICATION SCANNING
|
138
|
Ch04.QUALYS ADDITIONAL FEATURES
|
139
|
Ch04.OPENVAS OPEN SOURCE VULNERABILITY SCANNER
|
140
|
Ch04.SUGGESTED FREQUENCY FOR THE VULNERABILITY MANAGEMENT PROGRAM
|
141
|
Ch04.POTENTIAL CHALLENGES AND PITFALLS IN THE VULNERABILITY MANAGEMENT PROGRAM
|
142
|
Ch04.ASSET MANAGEMENT - MAINTAINING THE ENTERPRISE ASSETS - CHALLENGES
|
Midterm Examination
Week 09
143
|
Ch05.ASSET MANAGEMENT THROUGH QUALYS
|
144
|
Ch05.ASSET MANAGEMENT TOOLS FOR SECURITY FUNCTIONS
|
145
|
Ch05.WHAT IS SECURITY ENGINEERING ?
|
146
|
Ch05.WHAT IS THE OBJECTIVE OF SECURITY ENGINEERING ?
|
147
|
Ch05.WHOSE RESPONSIBILITY IS SECURITY ENGINEERING ?
|
148
|
Ch05.CIS 20 CRITICAL SECURITY CONTROLS
|
149
|
Ch05.CSC1: INVENTORY OF AUTHORIZED AND UNAUTHORIZED DEVICES
|
150
|
Ch05.CSC2: INVENTORY OF AUTHORIZED AND UNAUTHORIZED SOFTWARE
|
151
|
Ch05.CSC3-I: SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE
|
152
|
Ch05.CSC3-II: SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE
|
153
|
Ch05.CSC4-I: CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION
|
154
|
Ch05.CSC4-II: CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION
|
155
|
Ch05.CSC5-I: CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES
|
156
|
Ch05.CSC5-II: CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES
|
157
|
Ch05.CSC6-I: MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS
|
Quiz No. 3
Week 10
158
|
Ch05.CSC6-II: MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS
|
159
|
Ch05.CSC7-I: EMAIL AND WEB BROWSER PROTECTIONS
|
160
|
Ch05.CSC7-II: EMAIL AND WEB BROWSER PROTECTIONS
|
161
|
Ch05.CSC8-I: MALWARE DEFENSES
|
162
|
Ch05.CSC8-II: MALWARE DEFENSES
|
163
|
Ch05.CIS CONTROL 9: Limitation and Control of Network Ports, Protocols, and Services
|
164
|
Ch05.CIS Control 10: Data Recovery Capabilities
|
165
|
Ch05.CIS CONTROL 11: SECURE CONFIG FOR NETWORK DEVICES
|
166
|
Ch05.CIS CONTROL 11: SECURE CONFIG FOR NETWORK DEVICES-II
|
167
|
Ch05.CIS CONTROL 12: BOUNDARY DEFENSE-I
|
168
|
Ch05.CIS CONTROL 12: BOUNDARY DEFENSE-II
|
169
|
Ch05.CIS CONTROL 12: BOUNDARY DEFENSE-III
|
170
|
Ch05.CIS CONTROL 13: DATA PROTECTION-I
|
171
|
Ch05.CIS CONTROL 13: DATA PROTECTION-II
|
172
|
Ch05.CIS CONTROL 13: DATA PROTECTION-III
|
173
|
Ch05.CIS CONTROL 14: CONTROLLED ACCESS BASED ON NEED TO KNOW-I
|
174
|
Ch05.CIS CONTROL 14: CONTROLLED ACCESS BASED ON NEED TO KNOW-II
|
175
|
Ch05.CIS CONTROL 15: WIRELESS ACCESS CONTROL-I
|
Assignment No. 2
Week 11
176
|
Ch05.CIS CONTROL 15: WIRELESS ACCESS CONTROL-II
|
177
|
Ch05.CIS CONTROL 15: WIRELESS ACCESS CONTROL-III
|
178
|
Ch05.CIS CONTROL 16: ACCOUNT MONITORING & CONTROL-I
|
179
|
Ch05.CIS CONTROL 16: ACCOUNT MONITORING & CONTROL-II
|
180
|
Ch05.CIS CONTROL 16: ACCOUNT MONITORING & CONTROL-III
|
181
|
Ch05.CIS CONTROL 17: IMPLEMENT A SECURITY AWARENESS & TRAINING PROGRAM-I
|
182
|
Ch05.CIS CONTROL 17: IMPLEMENT A SECURITY AWARENESS & TRAINING PROGRAM-II
|
183
|
Ch05.CIS CONTROL 18: APPLICATION SOFTWARE SECURITY-I
|
184
|
Ch05.CIS CONTROL 18: APPLICATION SOFTWARE SECURITY-II
|
185
|
Ch05.CIS CONTROL 18: APPLICATION SOFTWARE SECURITY-III
|
186
|
Ch05.CIS CONTROL 19: INCIDENT RESPONSE & MANAGEMENT-I
|
187
|
Ch05.CIS CONTROL 19: INCIDENT RESPONSE & MANAGEMENT-II
|
188
|
Ch06.CIS CONTROL 20: PENETRATION TESTS & RED TEAM EXERCISES-I
|
189
|
Ch06.CIS CONTROL 20: PENETRATION TESTS & RED TEAM EXERCISES-II
|
190
|
Ch06.WHAT IS IT GOVERNANCE ?
|
191
|
Ch06.WHAT IS INFORMATION SECURITY GOVERNANCE ?
|
192
|
Ch06.WHY INFORMATION SECURITY GOVERNANCE IS AT STAGE 4 OF THE SECURITY TRANSFORMATION ?
|
193
|
Ch06.CAN INFORMATION SECURITY GOVERNANCE BE IMPLEMENTED SOONER THAN STAGE 4 ?
|
Week 12
194
|
Ch06.ANOTHER LOOK AT PAKISTAN'S INFORMATION SECURITY POSTURE AND CHALLENGES
|
195
|
Ch06.WHAT ARE THE INFORMATION SECURITY GOVERNANCE BUILDING BLOCKS ?
|
196
|
Ch06.WHOSE RESPONSIBILITY IS INFORMATION SECURITY GOVERNANCE ?
|
197
|
Ch06.HOW IS INFORMATION SECURITY GOVERNANCE IMPLEMENTED ?
|
198
|
Ch06.HOW CAN YOU BUILD AN EFFECTIVE INFORMATION SECURITY GOVERNANCE PROGRAM ?
|
199
|
Ch06.WHAT IS THE RECCOMENDED STRUCTURE OF THE INFORMATION SECURITY DEPARTMENT ? (LARGE ORGANIZATION)
|
200
|
Ch06.WHAT IS THE RECCOMENDED STRUCTURE OF THE INFORMATION SECURITY DEPARTMENT ? (MID-SIZED ORGANIZATION)
|
201
|
Ch06.WHAT IS THE RECCOMENDED STRUCTURE OF THE INFORMATION SECURITY DEPARTMENT ? (SMALL ORGANIZATION)
|
202
|
Ch06.ROLE OF THE CISO IN DRIVING THE INFOSEC PROGRAM
|
203
|
Ch06.WHAT ARE KEY INHIBITORS WHICH WILL LEAD TO FAILURE OF THE INFORMATION SECURITY PROGRAM ?
|
204
|
Ch06.INFORMATION SECURITY STRATEGY FOR SMALLER ORGANIZATIONS
|
205
|
Ch06.COMMON CHALLENGES WITH SECURITY GOVERNANCE DOCUMENTATION
|
206
|
Ch06.SECURITY DOCUMENTATION: POLICIES
|
207
|
Ch06.SECURITY DOCUMENTATION: STANDARDS
|
208
|
Ch06.SECURITY DOCUMENTATION: PROCEDURES
|
209
|
Ch06.SECURITY DOCUMENTATION: GUIDELINES
|
210
|
Ch06.HOW TO DEVELOP EFFECTIVE SECURITY POLICIES & DOCUMENTS
|
211
|
Ch06.WORLD'S LEADING INFORMATION SECURITY GOVERNANCE FRAMEWORK - ISO27001:2013 (ISMS)
|
Quiz No. 4
Week 13
212
|
Ch06.THE STRUCTURE OF ISO27001:2013 (ISMS); CLAUSES 4-6
|
213
|
Ch06.THE STRUCTURE OF ISO27001:2013 (ISMS); CLAUSES 7-10
|
214
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 1
|
215
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 2
|
216
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 3
|
217
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 4
|
218
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 5
|
219
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 6
|
220
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 7
|
221
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 8
|
222
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 9
|
223
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 10
|
224
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 11
|
225
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 12
|
226
|
Ch06.THE CONTROLS (APPENDIX) OF ISO27001:2013 (ISMS); PART 13
|
227
|
Ch06.HOW TO USE ISO27002:2013
|
228
|
Ch06.OTHER INFORMATION SECURITY FRAMEWORKS: PCI DSS V3
|
229
|
Ch06.OTHER INFORMATION SECURITY FRAMEWORKS: SANS TOP 20 CRITICAL SECURITY CONTROLS
|
Week 14
230
|
Ch06.OTHER INFORMATION SECURITY FRAMEWORKS: NIST
|
231
|
Ch06.OTHER IT GOVERNANCE FRAMEWORKS: COBIT
|
232
|
Ch06.OTHER IT GOVERNANCE FRAMEWORKS: CMMI
|
233
|
Ch06.ISO31000:2018 - RISK MANAGEMENT - AN INTRODUCTION
|
234
|
Ch06.ISO31000:2018 - RISK MANAGEMENT - 8 PRINCIPLES
|
235
|
Ch06.ISO31000:2018 - RISK MANAGEMENT - FRAMEWORK
|
236
|
Ch06.ISO31000:2018 - RISK MANAGEMENT - PROCESS
|
237
|
Ch06.ISO31000:2018 - RISK MANAGEMENT - HOW TO IMPLEMENT
|
238
|
Ch06.INCIDENT MANAGEMENT-I
|
239
|
Ch06.INCIDENT MANAGEMENT-II
|
240
|
Ch06.CHANGE MANAGEMENT-I
|
241
|
Ch06.CHANGE MANAGEMENT-II
|
242
|
Ch06.CHANGE MANAGEMENT-III
|
243
|
Ch06.PROJECT MANAGEMENT FOR INFORMATION SECURITY - PART 1 (IMPORTANCE)
|
244
|
Ch06.PROJECT MANAGEMENT FOR INFORMATION SECURITY - PART 2 (STRUCTURE)
|
245
|
Ch06.PROJECT MANAGEMENT FOR INFORMATION SECURITY - PART 3 (REPORTING)
|
246
|
Ch06.PROJECT MANAGEMENT FOR INFORMATION SECURITY - PART 4 (LEADERSHIP)
|
247
|
Ch06.CAPACITY MANAGEMENT - PART 1
|
Week 15
248
|
Ch06.CAPACITY MANAGEMENT - PART 2
|
249
|
Ch06.RISK MANAGEMENT & INTERNAL AUDIT-I
|
250
|
Ch06.RISK MANAGEMENT & INTERNAL AUDIT-II
|
251
|
Ch06.MANAGEMENT REVIEW
|
252
|
Ch06.HUMAN RESOURCE SECURITY
|
253
|
Ch06.CIRCULAR NO. 5, 2017, SBP, TECHNOLOGY GOVERNANCE FRAMEWORK
|
254
|
Ch06.CYBER SECURITY MATURITY MATRIX (CSMM) - OVERVIEW
|
255
|
Ch06.CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 1: FOUNDATION
|
256
|
Ch06.CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 2: FUNDAMENTALS
|
257
|
Ch06.CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 3: HARDENED
|
258
|
Ch06.CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 4: PROTECTED
|
259
|
Ch07.CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 5: MONITORED
|
260
|
Ch07.CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 6: SECURED
|
261
|
Ch07.ANOTHER LOOK AT THE INFORMATION SECURITY LIFECYCLE
|
262
|
Ch07.WHAT IS SECURITY VALIDATION ?
|
263
|
Ch07.HOW IS SECURITY VALIDATION PERFORMED ?
|
264
|
Ch07.WHAT IS SECURITY TESTING ?
|
265
|
Ch07.WHAT IS SECURITY ACCREDITATION ?
|
Week 16
266
|
Ch07.WHAT IS SECURITY ACCREDITATION PART 2 ?
|
267
|
Ch07.EMBEDDING INFORMATION SECURITY INTO THE SDLC
|
268
|
Ch07.SOFTWARE SECURITY TESTING & VALIDATION - PART 1
|
269
|
Ch07.SOFTWARE SECURITY TESTING & VALIDATION - PART 2
|
270
|
Ch07.EMBEDDING INFORMATION SECURITY INTO PROJECT MANAGEMENT
|
271
|
Ch07.HOW TO CONDUCT AN INTERNAL SECURITY ASSESSMENT ?
|
272
|
Ch07.WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS ?
|
273
|
Ch07.WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS - PART 2?
|
274
|
Ch07.WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS - PART 3?
|
275
|
Ch08.WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS - PART 4?
|
276
|
Ch08.WHAT ARE THE STAGES OF A THIRD PARTY PENETRATION TEST ?
|
277
|
Ch08.HOW TO FAIL IN IMPLEMENTING A SUCCESSFUL SECURITY TRANSFORMATION ?
|
278
|
Ch08.BENEFITS OF THE SECURITY TRANSFORMATION
|
279
|
Ch08.SECURITY TRANSFORMATION TIMELINE
|
280
|
Ch08.WHOSE RESPONSIBILITY IS THE SECURITY TRANSFORMATION ?
|
281
|
Ch08.RAISING MANAGEMENT SUPPORT FOR SECURITY TRANSFORMATION PROJECT
|
282
|
Ch08.KEY QUESTIONS TO ASSESS SECURITY POSTURE OF THE ORGANIZATION
|
283
|
Ch08.KEY LEADERSHIP QUALITIES OF THE SECURITY TRANSFORMATION HEAD
|
Final Term Examination
|
|
|