Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, Constraints and the market, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess c...
Network RequirementsClearPass goals, Network topology, List of available resources, Scenario analysis, Authentication requirements, Multiple user account databases, User account attributes, High level designPDI and Digital CertificatesCertificate typ...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Missing or im...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Cyber security threat types – the STRIDE model, Consequences of insecure software, Cloud security basicsCloud infrastructure basics, The Cloud...
Module 1: Introduction to DSM/SCM Module 1 provides an overview of the DSM/SCM product. Upon completion of this module, students will be able to:, Describe the primary purpose of DSM/SCM, State the names and functions of the five user interfaces, Sta...