Course Outline
Program
Module 1: Process vision
- Concepts and definitions.
- Types of cybersecurity processes concerned: operational (e.g.:
- intrusion testing campaigns) and governance (e.g. review of a
- risk management)
- The 2 main models of BPMN 2.0.
Module 2: Process modeling
- Approach the modeling of a process.
- Introducing Signavio™ Quick Model.
- Introducing Bizagi™ Modeler.
- Basic components of BPMN 2.0.
Workshop: simple modeling of cybersecurity, operational and governance processes.
The workshop can focus on the processes planned in the training, or on processes at the request of the trainees.
Module 3: Implementation in stages
- Cybersecurity audit.
- Simple modeling of security processes.
- Advanced modeling of security processes.
- Process execution.
- Process monitoring with BAM (Business Activity Monitoring).
Workshop: reflection on implementation in a concrete case. List of deliverables at the end of this reflection.
The workshop can focus on the process planned in the training, or on a process at the request of the trainees.
Module 4: Putting the BPM vision into perspective with others
- Methodologies
- BPM and Lean Six Sigma.
- BPM and ITIL.
- BPM and ISO standards.
- BPM and ISM (Information Security Management).
Workshop: study of the existing situation in the trainees' company.
Requirements
There are no specific requirements needed to attend this course.
Testimonials (6)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.