CSM Cyber I Certification

Develop the knowledge and skills to protect the end points. Cybersecurity and SAM are two emerging practices as an organization begins to secure their IT environment.  SAM and IT Security practitioners must Protect the End Points, and securing and managing software properly is essential to such a mission.  This course is designed to give those managing software and IT infrastructures the knowledge necessary to develop both controls and policies to help create one’s organizational environment as safe as possible from cyber-attacks.  Notes:  Student is suggested to have already completed the CSM.  The CSM Cyber I is its own certification, but may count towards the ESM Pro accreditation.

What You Will Learn

Who Should Attend

  • How SAM Relates to Cybersecurity
  • Understanding Security Vulnerabilities when Software Assets are Mismanaged
  • Roles of SAM and IT Security
  • Preventative Deployment Tactics and Tagging
  • Develop a Plan to Create a Proactive Secure Software Asset Management Initiative

Employees that are involved with the management of software and concerned about IT Security:  Software Asset Managers; Software Licensing Managers; Software Compliance Managers; IT Administrators; IT Asset Managers; IT Procurement Managers; IT Service Managers; Purchasing Agents; Legal Representatives; HR Personnel; and Chief Security Officers.

CSM Cyber I Syllabus

Unit I: Cybersecurity and Relation to SAM

  • Definition of Cybersecurity
  • How Cybersecurity Relates to the SAM Practitioner
  • Course Objectives
  • Hypothetical:  Non-Secure SAM Organization

Unit II: Understanding the Landscape

  • Data Protection and Integrity
  • Adversaries – SAM on Offense
  • Defenders – Protecting the End Points
  • Users – Human Elements
  • Technology – Clean Up and Defense
  • Hypothetical:  User Interference Simulation

Unit III: Protecting the End Points

  • Malware to Phishing – Concerns for the SAM Practitioner
  • Challenges to SAM
  • Patch Management Relevance
  • Essential Admin Controls
  • Exercise:  Spear Phishing Bait

Unit IV: Deter, Protect, Detect, Adapt

  • Deter Attacks
  • Protect Devices to Users to Data
  • Technical Detection
  • Adapt to Attacks and Set Up Proactive Controls
  • Hypothetical:  Patchwork Mess

Unit V: Securing the Cloud

  • SaaS Stipulations for Major Contracts
  • Validating Hosting Security
  • Multiple Authenticating Check Points
  • Hypothetical:  Lazy Password Mishaps
  • Quiz – Knowledge Check

Unit VI: Preventative Deployment

  • Deployment Procedures
  • Comply and Secure the Software
  • Tagging One’s Environment
  • Hypothetical:  Secure Environment/Tagged Environment

Unit VII: Roles of SAM and IT Security

  • Secure Software Management Team
  • Roles of Each Team Member
  • Evaluate Organization Current Security Status
  • Hypothetical:  Organization Open Environment – From BYOD to Loose Install Checks

Unit VIII: Planning Ahead

  • Building Blocks to a Secure Software Environment
  • Risk Management
  • Contingency Planning
  • Awareness, Education, Enforcement
  • Hypothetical:  SOS We Need a Plan
  • Quiz – Final Knowledge Check

Available OnDemand Summer 2018