Computational Thinking
Emerging Technologies
Strategy Development
Course Outline
Lesson 1
Supporting IT Governance & Risk Management
- Identify the Importance of IT Governance & Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
Lesson 2
Leveraging Collaboration to Support Security
- Facilitate Collaboration across Business Units
- Secure Communications & Collaboration Solutions
Lesson 3
Using Research and Analysis to Secure the Enterprise
- Determine Industry Trends and Their Effects on the Enterprise
- Analyze Scenarios to Secure the Enterprise
Lesson 5
Implementing Cryptographic Techniques
- Select Cryptographic Techniques
- Implement Cryptography
Lesson 7
Implementing Security Controls for Mobile Devices
- Implement Mobile Device Management
- Address Security & Privacy Concerns for Mobile Devices
Lesson 9
Implementing Security in the Systems & Software Development Lifecycle
- Implement Security throughout the Technology Lifecycle
- Identify General Application Vulnerabilities
- Identify Web Application Vulnerabilities
- Implement Application Security Controls
Lesson 11
Conducting Security Assessments
- Select Security Assessment Methods
- Perform Security Assessments with Appropriate Tools
Lesson 4
Integrating Advanced Authentication and Authorization Techniques
- Implement Authentication & Authorization Technologies
- Implement Advanced Identity & Access Management
Lesson 6
Implementing Security Controls for Hosts
- Select Host Hardware and Software
- Harden Hosts
- Virtualize Servers and Desktops
- Protect Boot Loaders
Lesson 8
Implementing Network Security
- Plan Deployment of Network Security Components & Devices
- Plan Deployment of Network-Enabled Devices
- Implement Advanced Network Design
- Implement Network Security Controls
Lesson 10
Integrating Assets in a Secure Enterprise Architecture
- Integrate Standards & Best Practices in Enterprise Security
- Select Technical Deployment Models
- Integrate Cloud-Augmented Security Services
- Secure the Design of the Enterprise Infrastructure
- Integrate Data Security in the Enterprise Architecture
- Integrate Enterprise Applications in a Secure Architecture
Lesson 12
Responding to and Recovering from Incidents
- Prepare for Incident Response & Forensic Investigations
- Conduct Incident Response & Forensic Analysis
Anticipating the Future of Teaching and Learning
Influencing higher education teaching and learning, now and in the future.


Fun Facts
Happy Clients
Completed Projects
Office Locations
Team Members
Up Coming Courses
Our Trademarked
Process & Workflow.
Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.
All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.
Project Research
Professional development
Resources
Up to date with current issues
Expertise
Global panel of leaders
Development
Adaptive learning
Study With Us
The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.