Course Outline
Program
Module 1: Process vision
- Concepts and definitions.
- Types of cybersecurity processes concerned: operational (e.g.:
- intrusion testing campaigns) and governance (e.g. review of a
- risk management)
- The 2 main models of BPMN 2.0.
Module 2: Process modeling
- Approach the modeling of a process.
- Introducing Signavio™ Quick Model.
- Introducing Bizagi™ Modeler.
- Basic components of BPMN 2.0.
Workshop: simple modeling of cybersecurity, operational and governance processes.
The workshop can focus on the processes planned in the training, or on processes at the request of the trainees.
Module 3: Implementation in stages
- Cybersecurity audit.
- Simple modeling of security processes.
- Advanced modeling of security processes.
- Process execution.
- Process monitoring with BAM (Business Activity Monitoring).
Workshop: reflection on implementation in a concrete case. List of deliverables at the end of this reflection.
The workshop can focus on the process planned in the training, or on a process at the request of the trainees.
Module 4: Putting the BPM vision into perspective with others
- Methodologies
- BPM and Lean Six Sigma.
- BPM and ITIL.
- BPM and ISO standards.
- BPM and ISM (Information Security Management).
Workshop: study of the existing situation in the trainees' company.
Requirements
There are no specific requirements needed to attend this course.
Testimonials (9)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .
Roger - OTT Mobile
Course - .NET, C# and ASP.NET Security Development
Beginning by how to hack to better understand how to secure was very interesting and appreciated.