![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() |
Course Description | |
Unless functional security requirements are translated into realistic technical specifications, the final solution may be overly restrictive and expensive or, worse still, seriously insecure. To help achieve the necessary balance, this course demonstrates how to interpret and extend the Government Security Policy (GSP) and other related policies to system specific requirements, both functional and technical, as part of a system development life cycle. ![]() |
|
Outline | |
![]() |
|
Audience | |
Project managers, system architects, system (security) administrators and IT security professionals.
![]() |
|
Course Level | |
Intermediate Recommended preparation: Course S50 - Certification and Accreditation (C&A;): Achieving Confidence and Accountability, or equivalent ![]() |
|
Prerequisite(s) | |
None
![]() |
|
Special Note(s) | |
None
![]() |
|
Additional Readings/Instructor-suggested URLs | |
Communications Security Establishment Canadian Handbook on Information Technology Security (MG-9) http://www.cse-cst.gc.ca/publications/gov-pubs/itsg/mg9-e.html Threat and Risk Assessment Working Guide (ITSG-04) http://www.cse-cst.gc.ca/publications/gov-pubs/itsg/itsg04-e.html SANS Security Policy Project To view the Security Policy Project, please follow the indicated steps:
![]() |
|
Date(s) | (E) = English (F) = French |
February 14, 2006 (E) March 2, 2006 (F) ![]() |
|
Fee |
$450 - GoC $550 - Non-GoC
![]() |