Please enable JavaScript.
Coggle requires JavaScript to display documents.
DevSecOps Digital Transformation 2021 - 2022, 2021 Transformational…
DevSecOps
Digital Transformation
2021 - 2022
Stage 2
6 Months
CISSP - Prep
OS Security Tools OSQuery
WireShark
Stage 3
2 Months
Deep Dive Into Top 20 CIS Controls
Deep Dive CIS Benchmark Linux , Nginx, DB
ISO 27001 Lead implementer Prep
Stage 1
4 Months
Python L1 - L3
Geneva Essentials
Linux OpenSource + Nginx
Stage 5
3 Months
Vulnerability Assessment
NW PenTest
Ethical Hacking | Incident Response
Stage 6
3 Months
Maths - Algebra, Geometry
Calculus - Prep for MS , DL , AI
WebAPP Pentest
Stage 4
3 Months
Azure Cloud Revisit
SEIM
DevSecOps
2021 Transformational Strategy
New Client Onboarding/ Deals
Strict Vendor Due Diligence Process
Budget & Resources
Business Case Development
Balancing Budget for People, Training & Tools/Technology
Security Projects
Interns / Contractors
Legal & Huma Resource
Data Retention & Destruction
Vendor Contracts
Investigations/Forensics
Project Delivery & Life Cycle
Design
Security Testing
Requirement Gathering
System Security Architecture
Defense- in- Depth
VDIs - Remote Access
Application Protection
Encryption & Tokenization
Network Segmentation
Backup Replication / Multiple Sites
Security Risk Management
Pentesting
Code Reviews in SSDLC
Risk Assessment Methodology
Ongoing Risk Assessment
Vulnerability Management
Policies & Procedures
Physical Security
Awareness Campaign
Data Centric Focus
Data Loss Prevention
Encryption / Masking / Tokenization
Monitoring & Alerting
Access Controls
Data Classification
Identity Management
LDAP / Active Directory
Federation
Single Sign on (SSO like 2 Keys)
2 Factor Authentication
Account Creation / Deletion
Role Based Access Control
Credentialing
Password Reset Self Service
Business Continuity & Disaster Recovery
ISO 22301
Governance Risk & Compliance
Risk Management
Security Assessment
Risk Assessment
Certification & Attestation
ISO 27001 for Cyber Security
ISO 27017 for Cloud Security
SOC 1 , 2, 3 Certificates Requirement
ISO 27018 for Privacy
Governance
Data Ownership
Conflict Management
Roles & Responsibilities
Resource Management
Metrics & Reporting
Risk Management Framework
Validating effectiveness of metrics
Strategy & Business Alignment
Incident management
Update & test Incident Response plan
Set Leadership Expectations
Data Breach Prep
Media Relations
Forencis Investigation
Business Continuity Plan
Incident Readiness Assessment
Forensic & IR Partner
Incident Response
Insurance Policy
Adequate Logging
Threat Prevention
Anti Malware, Anti Spam
Proxy / Caching Filtering
Data Loss Prevention
Patching
Information Policies & Procedures
DDOS Protection
Identity Management
Hardening Procedures
Intrusion Prevention System
File Integrity Monitoring
Application Security
Data Encryption & Tokenization
Vulnerability Management
PKI
Network/ Application Firewalls
Security Health Checks
Admin Monitoring In Realtime
CyberOps
CyberOps Training & Development
Soc Automation & Orchestration
Endpoint Detection
Offensive Security
Assurance & Compliance
Certification & Validation of Internal System
Supply Chain Management Verification
IT Security Audit
Forensics Roadmap
iOS Forensics & IR
Memory Forensics
Operating System Forensics
Network Forensics
Incident Response & Hunting
Threat Intelligence
Threat Hunting
Smart Phones & Tablets Forensics