The Essential Cybersecurity Architecture Modeling Applied workshop can be tailored for popular Agile and Lean development methods (Scrum is the default), mainstream visual modeling languages (UML™, OMG SysML™), and leading visual modeling tools. The hands-on cybersecurity training teaches model-based principles and techniques for precisely specifying network architectures and cybersecurity related features, such as firewalls, encryptor/decryptor devices, and Unified Threat Management (UTM) devices. The cybersecurity workshop also includes learning modules for modeling cyber attacks and defenses, cyber standards and frameworks, cyber penetration testing, and cyber simulations.
A major learning goal of the Cybersecurity Architecture Modeling training is to show how to specify architectural roadmaps for transitioning traditional network architectures with static, perimeter-based cyber defenses to next-generation network architectures with increased network "situational awareness" and improved cyber defense capabilities. The next-generation network architecture modeling emphasizes more dynamic and aggressive cyber countermeasures, consistent with the evolving concept of a Moving Target Defense (MTD).
The default specification language for the new workshop is CyberML™ (Cybersecurity Modeling Language™), a scalable Architecture Modeling Language for specifying secure distributed systems. CyberML is designed by
"The recent cybersecurity breaches at Target, MtGox,
"An organization can only effectively protect its cyber assets from savvy cyber-criminals and cyber-warriors if it knows its own network architecture, cyber assets, and cyber defenses better than its adversaries do. Unfortunately, many organizations still specify their network architectures with low-fidelity and ambiguous Visio and Powerpoint diagrams, which don't allow them to answer essential cybersecurity questions. PivotPoint's new Cybersecurity Architecture Modeling workshop shows how to specify architectural roadmaps for migrating static, perimeter-based cyber defenses to more dynamic and aggressive cyber countermeasures, consistent with the evolving Moving Target Defense concept. Properly designed Moving Target Defenses should complement perimeter-based cyber defenses and reverse roles for cyber intruders, making them the hunted prey rather than the hunter."
The Essential Cybersecurity Architecture Modeling Applied workshop is based on flexible learning modules that can be taken together, or blended with complementary language, architecture framework, and tool learning modules. Model-Based tool learning modules are offered for several popular visual modeling tools (Enterprise Architect™, MagicDraw™, UModel™, Visual Paradigm™, and Astah™), with new tool modules being added based on client demand. Clients can flexibly combine learning modules, and can also add adaptable Project Practicum modules, to tailor their training for their team and project needs.
The Essential Cybersecurity Architecture Modeling Applied workshop is available immediately, and the training can be delivered both onsite and online. All training can be followed up with comprehensive Consulting and Coaching services, also delivered onsite and online, to address specific team and project needs.
CUSTOM MODEL-BASED SOLUTIONS, CYBERML, CYBERSECURITY MODELING LANGUAGE and ESSENTIAL CYBERSECURITY ARCHITECTURE MODELING APPLIED are trademarks of
Read the full story at http://www.prweb.com/releases/cybersecurity/training/prweb11957141.htm
Most Popular Stories
- Pickup Discounts Boost September Auto Sales
- Kurdish Militia Still Lack Weapons, Training
- Review: Pay by Phone or Just Keep Using Plastic?
- Lexus Luxury Compact Sedan Wins Buyers
- N.Y. Ups Awards of State Contracts to Minorities
- Ebola Victim Was Sent Home by Dallas Hospital
- Dallas Parents Fear Students Exposed to Ebola
- Group Offers Online Help for College Students
- Baker Hughes to Disclose Fracking Chemicals
- Why the Bond Market Isn't as Safe as You Think