Security Engineering Workshop is a 2-day studying path supplies a comprehensive, deep-dive into the security engineering. This unique workshop program construct your information and abilities round every part from securing storage and gadgets to implementing and sustaining programs to managing threat and vulnerabilities. You'll additionally find out about secure systems, software and embedded program development, the significance of calamity restoration and continuity planning, and a wide range of technical security controls. Upon completion, participants will possess a radical understanding of security engineering greatest practices, processes and strategies that you could to hold over to your subsequent function or venture.
Learning Objectives
- Understand fundamental concepts of security engineering.
- Explore various encryption and authentication techniques.
- Learn best practices for secure software development.
- Examine common vulnerabilities and threats in computer systems.
- Gain hands-on experience with penetration testing tools.
- Develop skills in network security and intrusion detection.
- Explore security policies and compliance requirements.
- Understand the role of risk assessment in security planning.
- Learn incident response and management techniques.
- Discuss emerging trends and challenges in security engineering.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.