Programma
Programma
In dit traject gaan we heel hands-on te werk. Je maakt kennis met DevSecOps principes als CI/CD pipelines, SAST, DAST en interactieve labo's in samenwerking met Everable. In onderstaand schema krijg je een duidelijk overzicht van de opleiding.
Study points | |
---|---|
Cybersecurity defense (Blue team) | 6 |
Detection technologies Perimeter-based cybersecurity technology to detect and prevent intrusions |
1.5 |
Behavior based detection Technology for behavior-based detection and detection in cloud environments, including security orchestration and remediation capabilities |
1.5 |
Incident response Technology for incident response after the initial detection, including forensics and anti-forensics technologies |
1.5 |
Threat intelligence and threat hunting Using threat intelligence sources as input for threat hunting; threat hunting is the technique to formulate hypotheses and find proof of them |
1.5 |
Cybersecurity offense (Red team) | 6 |
Embedded hardware hacking | 2 |
Infrastructure red teaming | 2 |
Advanced web attacks | 2 |
Application-level security (Yellow team) | 4 |
Application security testing and automation techniques An introduction to DevSecOps principles with CI/CD pipelines, SAST, DAST and hands-on labs in collaboration with devsecops-academy.com |
2 |
Advanced cybersecurity development techniques This includes encryption during use, quantum computing, as well as cybersecurity and AI |
2 |
Cybersecurity governance (White collar team) | 4 |
Legal and cybersecurity frameworks This covers the legal and technical frameworks to define and validate your overall security policy |
2 |
Risk assessment, threat modelling, control effectiveness This covers threat modelling as the center of risk assessment as well as identification of suitable controls |
2 |
Total | 20 |