Course Description
Analysis skills are critical to ensuring cybersecurity requirements are built as part of the product solution and not an afterthought in both today and tomorrow’s technology solutions. In this course you’ll learn key techniques to utilize when working with technology and needing to address cybersecurity requirements. First, you’ll explore techniques to help you identify and elicit requirements from your stakeholders that are key to solution success. Next, you’ll dive into audits, best practices, and technology that will help you define cybersecurity from an organizational perspective. Finally, you’ll learn how to plan and map out how solutions address cybersecurity requirements. When you’re finished with this course, you’ll have the skills and knowledge of knowing how to build out an analysis plan and construct a proposed solution that directly addresses all cybersecurity needs for your organization.
Part of These Certificates
Ability to conduct a stakeholder analysis
Understand how to draft a RACI for a Cybersecurity project or program initiative
Understand difference between compliance and best practice
Develop a business case, business process flow diagram, and identify steps along the path that present potential cybersecurity vulnerabilities
Identify Cybersecurity Requirements from list of requirements
Document current state business process including current technology
Map Product Cybersecurity solution components back to security requirements
Related Courses
Earning a SLU certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
No related courses found.