Description
The Security White Belt Certification course consists of 14 modules covering the foundational principles of cyber security, with a specialization in application and product security. The course content is presented as an interactive security conversation, interview style. The interviews are conducted by real security people that love security, talking about the thing they love in a video based format. Security White Belt answers why security is crucial and explains how and why security must be built into everything. The Security White Belt course teaches you to become a cyber security professional.
Course Details
Duration: 4 hours
Fee: Individual, $99; group rates available
Course Goal
To make you a successful cyber security person; evidenced by earning the Security White Belt certification.
Course Objectives
After completing this course, the student should be able to:
- Recognize and define key cyber security terms
- Identify basic attack strategies (buffer overflow, web app, denial of service, DDoS, malware, phishing, and social engineering)
- Understand the importance of building security in
- Recognize the threat landscape and how it impacts IoT, Cloud, and Mobile
- Discover the types of data that require privacy protection and options for protecting privacy of data
- Explore modern data breaches and understand the impact of cyber security failures
- Apply the cyber security mindset to your career
Course Prerequisites
The following are the recommended prerequisites for this technical training course:
- There are no formal prerequisites
- Students should have a desire to learn about cybersecurity
Who Should Attend
This course is designed for technical professionals who are new to cyber security.
The primary audience for this course includes:
- Managers in high-tech industries
- Developers
- Testers
- Program Managers
- Product Managers
Course Outline
Course topics include the following:
Fundamentals
- Basic vocabulary to succeed as a cyber security person
Attacks & Attackers
- The primary types of attackers and the methods they use to attack
Breached
- A case study of three prominent security incidents
Business Case
- Security has a return on investment
Myths
- The world is ripe with myths, and security is no different
Threat Landscape
- IoT, Cloud, Mobile: a survey of the latest technologies, and the threats to their security
Software Supply Chain
- Software is made up of many libraries, and those libraries need protecting
Culture & Mindset
- Your security mindset is what makes you a security person, understand how to embrace and extend it
Managing Resources
- The activities that go into building secure applications and products
Soft Skills
- How to apply communication and empathy as a security pro
Secure Development Lifecycle
- The process to build security in to everything
Privacy and Customer Data Protection
- What is privacy and how to protect your customer’s most valued assets
Product Incident Response
- How to respond when a vulnerability is found
Knowledge Sources
- The sources of information that we use ALL the time