Training agenda
  1. Building general strategy and security architecture:
  1. Designing security operation strategies:
  1. Designing strategies of identity security:
  1. Evaluating rule compliance strategies:
  1. Evaluating the state of security and recommended technical Risk Management strategies:
  1. Acquaintance with best practices related to architecture and their change in cloud:
  1. Designing strategy of securing server and client end points:
  1. Designing strategy of securing PaaS, IaaS and SaaS strategies:
  1. Specifying security fundamentals for applications:
  1. Planning data security strategy: