← Back to Course Offerings

The Security White Belt

Security, Technology

Description

The Security White Belt Certification course consists of 14 modules covering the foundational principles of cyber security, with a specialization in application and product security. The course content is presented as an interactive security conversation, interview style. The interviews are conducted by real security people that love security, talking about the thing they love in a video based format. Security White Belt answers why security is crucial and explains how and why security must be built into everything. The Security White Belt course teaches you to become a cyber security professional.

Course Details

Duration: 4 hours

Fee: Individual, $99; group rates available

Course Goal

To make you a successful cyber security person; evidenced by earning the Security White Belt certification.

Course Objectives

After completing this course, the student should be able to:

  • Recognize and define key cyber security terms
  • Identify basic attack strategies (buffer overflow, web app, denial of service, DDoS, malware, phishing, and social engineering)
  • Understand the importance of building security in
  • Recognize the threat landscape and how it impacts IoT, Cloud, and Mobile
  • Discover the types of data that require privacy protection and options for protecting privacy of data
  • Explore modern data breaches and understand the impact of cyber security failures
  • Apply the cyber security mindset to your career

Course Prerequisites

The following are the recommended prerequisites for this technical training course:

  • There are no formal prerequisites
  • Students should have a desire to learn about cybersecurity

Who Should Attend

This course is designed for technical professionals who are new to cyber security.

The primary audience for this course includes:

  • Managers in high-tech industries
  • Developers
  • Testers
  • Program Managers
  • Product Managers

Course Outline

Course topics include the following:

Fundamentals

  • Basic vocabulary to succeed as a cyber security person

Attacks & Attackers

  • The primary types of attackers and the methods they use to attack

Breached

  • A case study of three prominent security incidents

Business Case

  • Security has a return on investment

Myths

  • The world is ripe with myths, and security is no different

Threat Landscape

  • IoT, Cloud, Mobile: a survey of the latest technologies, and the threats to their security

Software Supply Chain

  • Software is made up of many libraries, and those libraries need protecting

Culture & Mindset

  • Your security mindset is what makes you a security person, understand how to embrace and extend it

Managing Resources

  • The activities that go into building secure applications and products

Soft Skills

  • How to apply communication and empathy as a security pro

Secure Development Lifecycle

  • The process to build security in to everything

Privacy and Customer Data Protection

  • What is privacy and how to protect your customer’s most valued assets

Product Incident Response

  • How to respond when a vulnerability is found

Knowledge Sources

  • The sources of information that we use ALL the time