Course Outline
Programme
Module 1: Principles of Modeling
- Concepts and definitions. Types of Cybersecurity processes: operational and governance. Control flow patterns. Objectives of BPMN 2.0.
Module 2: Presentation of the modeling tool
- The training workshops are done on the Signavio Process Manager tool. It can be done on the modeling tool already used by the company.
Module 3: Level 1 Modeling
- Task types (user, script, service, send, receive). Business rules and business rule tasks. Types of sub-processes (built-in, events, ad-hoc, transactions) Types of reusable sub-processes (built-in, call activities). Data gateways. Types of events: start, end, intermediate.
Workshops: process modeling in Cybersecurity.
Module 4: Level 2 Modeling
- Collaborations between processes: messages and signals. Intermediate events: in the flow, or at the border (of a task or a sub-process). Event gateways. Complex gateways. Repetitive activities: loop, multi-instance.
Workshops: modeling of more complex Cybersecurity processes.
Module 5: Modeling Best Practices
- Basic modeling principles. Model hierarchy. Labels of basins, footbridges, activities, events. Basic rules of use.
Module 6: Processes Become Applications
- Modeling and execution of a process.
Workshops: demo of a process transformed into a business application, with Oracle BPM.
Requirements
There are no specific requirements needed to attend this course.
Testimonials (11)
Me gustó ver desarrollo seguro en ASP.NEt pero hicieron falta ejercicios práticos para implementar en el dia a dia de los desarrolladores
Alma Xocua - PASE, Servicios Electrónicos S.A. de C.V.
Course - Comprehensive C# and .NET Application Security
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.
Gergely Bathó - GE Medical Systems Polska Sp. Z O.O.
Course - Application Security for Developers
The Burpe suite i need more training in this
Gontse Ntshegi - Vodacom
Course - Android Security
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job
Toby
Course - Application Security in the Cloud
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated