Course Taxonomy: Technology Platforms

Plans in Jira Software

1. Course Overview

  • Purpose of the course
  • Target audience and prerequisites
  • Schedule and total duration

Lab 1 – Log in (5 min)

2. Introduction to Planning / Getting Started with Plans

  • Purpose and benefits of using Plans
  • Challenges of long-term planning
  • Agile vs. Enterprise planning
  • Big picture planning meetings (quarterly)
    • Define strategic themes
    • Review customer/internal feedback, market, and goals
  • Roles and planning requirements
    • Managers/Planners
    • Executives/Stakeholders
    • Jira Admins
    • Scrum Masters/Dev Leads
  • Key features of Plans (single source of truth, scenarios, forecasting, progress tracking, sharing)

Lab 2 – Getting Started with Plans (20–30 min)

3. Creating and Navigating Plans

  • What is a Plan?
    • Visualization of work
    • Shared source of truth
  • What goes into a Plan?
    • Scope (boards, projects, filters)
    • Releases (versions in Jira)
    • Teams (velocity, capacity, iteration length)
  • Creating a new plan (empty or with sample data)
  • Navigating the Plan interface
    • Main tabs: Timeline, Calendar, Program, Teams, Releases, Dependencies
    • Work item creation and ranking
    • Accepting and committing changes
    • Filters, saved views, sharing
    • Plan settings (estimation units, dates, permissions, scenarios)

Lab 3 – Creating and Touring a Plan (25–30 min)

4. Working with Teams

  • Definition of a team in Plans
  • Why plan at the team level?
  • Configuring teams (Scrum or Kanban)
    • Velocity, capacity, iteration length
  • Atlassian teams vs. Plan-only teams
  • Managing global teams across Plans

Lab 4 – Working with Teams (15 min)

5. Using the Auto-Scheduler / Working with the Schedule

  • How the Auto-scheduler works
  • Executing and reviewing schedules
  • Overwriting work item values
  • Factors that affect scheduling
    • Dependencies, estimation methods, sprint assignments, ranking, team capacity
  • Adjusting plans manually after scheduling
  • Saving or discarding changes

Lab 5 – Working with the Schedule (25–30 min)

6. Working with Dependencies

  • Defining dependencies
  • Blocks vs. is blocked by
  • Required vs. dependent issues
  • Multi-issue dependencies
  • Creating dependencies in Jira vs. directly in Plans
  • Visualizing dependencies (badges, lines, indicators)

Lab 6 – Managing Dependencies (30–45 min)

7. Releases and Scenarios

  • Understanding Releases in Plans
  • Planning with fixed vs. flexible dates
  • Creating multiple scenarios (what-if analysis)
  • Comparing and sharing scenarios

Lab 7 – Releases and Scenarios (45–60 min)

8. Sharing and Exporting Plans / Customizing Views

  • Sharing Plans with stakeholders (read-only mode)
  • Export options (reports, presentations)
  • Customizing views
    • Colors, filters, fields, saved views
    • Tailoring views for specific audiences

Lab 8 – Using Views and Sharing Plans (40–45 min)

Confluence Administration

Module 1: Course Introduction

  • Welcome & Introductions
    • Course logistics, tools, and interactions
    • Icebreakers (Introductions, Locations, Experience with Confluence)
  • Lab 1 – Accessing Your Lab Environment (5 min)
    • Log into Confluence site

Module 2: User Management and Permissions

  • Administration Levels
    • Organization admin, Site admin, User access admin, Confluence admin, Space admin
  • User Management
    • Adding and removing users
    • Roles: User, App Admin, Guest
    • Groups and default groups
  • Permissions
    • Global permissions
    • Space permissions
    • Page restrictions
    • Recovering space permissions
  • Key Considerations
    • Anonymous access and security implications
    • Guest users and public links

Lab 2 Exercise 1 – Configuring Global Permissions (5 min)

  • Revoke, grant, and assign create space permissions

Lab 2 Exercise 2 – Creating a Space and Managing Permissions (15 min)

  • Access default space permissions
  • Create Knowledge Base space for Events team
  • Star Event & Finance spaces
  • Override space permissions
  • Configure permissions for Event space
  • Create Finance space
  • Add user to Finance space
  • Edit permissions for Finance space
  • Verify space permissions (optional)

Module 3: Configuring Global Settings

  • Initial Configuration
    • Default language, look & feel, email notifications, apps, auditing
  • Jira Integration
    • Linking Confluence with Jira
    • Application navigator customization
  • Customization
    • Logo, favicon, homepage, themes, headers/footers
  • Troubleshooting & Auditing
    • Using audit logs for tracking and compliance

Lab 3 Exercise 1 – Viewing & Updating Global Settings (10 min)

  • Update site title, contact message, attachment limits, apps, notifications

Lab 3 Exercise 2 – Customizing the Look and Feel (5 min)

  • Change site logo and color scheme

Lab 3 Exercise 3 – Using the Audit Log (5 min)

  • Review log entries and retention

Module 4: Confluence Exports and Backups

  • Exporting Content
    • PDF, HTML, CSV/XML formats
    • Single page/blog exports
    • Customizing PDF layouts and stylesheets
  • Security Implications
    • Restricted pages in exports
  • Restoring Content
    • Importing from CSV
    • Limitations with groups and users
  • Archiving vs. Deleting Spaces
    • Benefits and visibility impacts
  • Backups
    • Site vs. space backups
    • Frequency and limitations
    • Import considerations

Lab 4 Exercise 1 – Exporting & Archiving a Space (10 min)

  • Create a PDF export
  • Archive Event space

Lab 4 Exercise 2 – Backing Up and Restoring (15 min)

  • Create site backup
  • Create space backup
  • Delete Finance space
  • Import space from CSV backup

Module 5: Confluence Analytics

  • Overview
    • Purpose and benefits (Premium/Enterprise only)
  • Permissions
    • Restricting analytics access
  • Levels of Analytics
    • Site-level: adoption, popular spaces, searches
    • Space-level: popular content, active readers/contributors
    • Page-level: views, engagement, read time
  • Exporting Analytics
    • Excel reports for site, space, and users

Lab 5 Exercise 1 – Space Analytics (10 min)

  • Restrict Analytics access
  • View site analytics
  • View space analytics
  • View page analytics
  • Export analytics as report

Managing Confluence Spaces

Module 1: Setting Up a Space

  • Introduction to Confluence Spaces
    • Definition of spaces (personal vs. site spaces)
    • Organizing content in hierarchies
    • Space keys and their importance
  • Permissions and Administration
    • Global vs. space-level permissions
    • Creating personal and site spaces
    • Default and customized space permissions
    • Recovering space permissions
  • Controlling Access
    • Page-level restrictions (view vs. edit)
    • Inheritance of restrictions
    • Requesting and granting access to restricted pages
    • Inspecting permissions

Lab 1 – Accessing Your Lab Environment (5 min)

  • Log into Confluence site

Lab 2 Exercise 1 – Create a Space and Manage Permissions (15 min)

  • Create a Knowledge Base Space
  • Change Space Permissions to Default
  • Create a Team Space
  • Edit Space Permissions

Lab 2 Exercise 2 – Controlling Access to Pages (15 min)

  • Add and Update Page Restrictions
  • Remove Page Restrictions
  • Troubleshoot Page Restrictions

Module 2: Managing Space Content

  • Managing Pages
    • Moving, deleting, restoring pages
    • Fixing hidden pages
  • Using Labels
    • Standard labels for categorization
    • Labels impact on macros
  • Templates & Blueprints
    • Page templates vs. blueprints
    • Types (space, global)
    • Creating, customizing, promoting, disabling templates/blueprints
  • Macros
    • Adding dynamic functionality
    • Page restrictions impact on macros
    • Tracking macro usage

Lab 3 Exercise 1 – Managing Pages (15 min)

  • Configure Page Tree View
  • Manage Hidden Pages
  • Use Undefined Links
  • Troubleshoot Page Access

Lab 3 Exercise 2 & 3 – Create a New Page Template & Promote/Disable Blueprints (20 min)

  • Create a New Page Template
  • Add Variables & Placeholder Text
  • Add Labels to Template
  • Create Page using Template
  • Promote a Blueprint
  • Disable a Blueprint

Lab 3 Exercise 4 – Macros (15 min)

  • Add Page Properties Macro to Pages
  • Create a Page with a Label
  • Label Existing Pages
  • Create a Page with Page Properties Report & Content by Label Macros

Module 3: Exporting Spaces

  • Reasons for Export
    • Printable documentation (PDF)
    • Static websites (HTML)
    • Backups & migration (CSV/XML)
  • Export Options
    • PDF layout and stylesheet customization
    • Security considerations (restricted pages exported)
  • Restoring Spaces
    • Importing from XML/CSV
    • Limitations on users and groups
  • Archiving vs. Deleting Spaces

Module 4: Analyzing Spaces (Optional)

  • Overview of Confluence Analytics
    • Site-level: adoption, popular spaces, trending searches
    • Space-level: popular content, active readers/contributors
    • Page-level: engagement, views, mentions, attachments
  • Permissions for Analytics
  • Exporting Analytics to Reports

Lab 5 Exercise 1 – Space Analytics (10 min)

  • Restrict Access to Analytics
  • View Site/Space/Page Analytics
  • Export Analytics as Report

Jira Administration Part 2

1. Mapping Your Business into Jira

  • Importance of business analysis before configuration
  • Goals: reduce rework, improve efficiency, encourage adoption
  • Approach: Discover → Map → Implement
  • Stakeholder engagement: interviews, MoSCoW prioritization, process diagrams
  • Case study: Teams in Space – cleanup and standardization of messy Jira instance

Lab 1 – Mapping Business Requirements into Jira

  • Cloud: View Teams in Space requirements (5 min)
  • Data Center: Start lab VM & view requirements (5 min)

2. Assigning Project Roles & Sharing Schemes

  • Identifying Scrum vs. business team roles
  • Jira roles: Administrators, Project Lead, Default Assignee, Board Administrators
  • Mapping team roles to Jira roles & permissions
  • Teams in Space case: restricting developer admin rights, designating Scrum Master as Lead
  • Shared schemes: benefits (consistency, reduced admin overhead, performance) vs. drawbacks (less flexibility, stakeholder involvement)

Lab 2 – Assigning Roles & Sharing Schemes

  • Assign project roles (40–50 min)
  • Create a standard project as a baseline
  • Share schemes across projects

3. Configuring Work/Issue Types, Fields & Screens

  • Creating work/issue types and custom fields
  • Best practices: reuse fields, avoid unnecessary customization
  • Screen schemes and field configurations
  • Mapping screens to operations (Create/Edit/View)
  • Case study application: aligning Teams in Space work types to new schemes

Lab 3 – Configuring Work/Issue Types, Fields & Screens

  • Cloud: 1h 20m
  • Data Center: 2h 10m
  • Create fields, configure screen schemes, apply field configurations

4. Configuring Screens & Schemes (Cloud only)

  • Field configuration schemes
  • Workflow schemes
  • Notification & permission schemes
  • Work item/issue security schemes

Lab 4 – Configuring Screens & Schemes (1h, Cloud only)

5. Creating & Configuring Workflows

  • Workflow elements: statuses, transitions, conditions, validators, post functions
  • Workflow schemes: associating workflows with work/issue types
  • Best practices: keep workflows simple, avoid over-engineering, encourage reuse

Lab 5 – Creating & Configuring Workflows

  • Cloud: 1h 15m
  • Data Center: 1h 25m
  • Build workflows for bugs, stories, and other issue types; implement workflow schemes

6. Configuring Board & Sprint Permissions

  • Role of board administrators
  • Configuring permissions for Scrum Masters vs. team members
  • Aligning permissions with Teams in Space governance model

Lab 6 – Configuring Board & Sprint Permissions

  • Cloud: 40 min
  • Data Center: 1h

7. Configuring Email Notifications (Cloud only)

  • Notification schemes overview
  • Mapping project roles to notifications
  • Balancing notification overload vs. missing key updates

Lab 7 – Configuring Email Notifications (25 min, Cloud only)

8. Applying New Configurations to Projects

  • Applying schemes to new projects
  • Migrating existing projects to new standardized schemes
  • Cleaning up unused schemes
  • Teams in Space: enforcing standardization going forward

Lab 8 – Applying New Configurations to Projects

  • Cloud: 1h
  • Data Center: 55 min

Jira Administration Part 1

1. Course Overview

  • Learning objectives:
    • Hierarchy of cloud administration
    • Configure Jira settings
    • Global permissions
    • Company-managed projects
    • Jira schemes basics
    • Project permissions and roles
  • Prerequisites (Jira Essentials with Agile Mindset or equivalent)
  • Course schedule (4 hours total)

2. Configuring Jira

  • Jira administration hierarchy (Org, Site, User, Product Admin roles)
  • Key admin tasks:
    • Integrating products & apps
    • Branding look & feel
    • Setting default language
    • Time tracking configuration
    • Audit log configuration

Lab 2 – Configuring Jira (20 min)

  • Exercise 1: Explore application links & apps
  • Exercise 2: Brand Jira
  • Exercise 3: Configure auditing
  • Optional Exercise 4: Explore configuration settings

3. Configuring Global Permissions

  • Difference between global vs. project permissions
  • Global permissions overview:
    • Administer Jira
    • Browse users & groups
    • Share dashboards & filters
    • Manage group filter subscriptions
    • Make bulk changes
    • Create team-managed projects
  • Assigning/removing permissions from groups
  • Risks of assigning to "Public"

Lab 3 – Configuring Global Permissions (15 min)

  • Exercise 1: Removing and adding global permissions

4. Jira Projects Overview

  • Company-managed vs. team-managed projects
  • Project templates (software, business, service management)
  • Jira project concepts:
    • Work items & types (bug, task, story, epic, sub-task)
    • Work item fields
    • Workflows & boards
    • Project categories
    • Project trash & archiving

5. Creating & Configuring Company-Managed Projects

  • Creating projects (templates, naming, categories, shared configs)
  • Project workflows (simplified vs. complex)
  • Fields and screens (adding, editing, layouts)
  • Schemes overview (workflow schemes, reusability, project association)

Lab 5 – Creating & Configuring Company-Managed Projects (35 min)

  • Exercise 1: Create a project
  • Exercise 2: Edit project details
  • Exercise 3: Update workflow
  • Exercise 4: Update fields and screens
  • Exercise 5: Add work type

6. Configuring Company-Managed Project Permissions

  • Permission types (project, work items, comments, attachments, time tracking, etc.)
  • Permission schemes: structure, reuse, examples
  • Default permission schemes (software, business)
  • Open vs. restricted schemes
  • Public permissions considerations

Lab 6 – Configuring Project Permissions (30 min)

  • Exercise: Create and edit a permission scheme

7. Configuring Company-Managed Project Roles

  • Understanding roles (administrators, project leads, users, custom roles)
  • Role-based permission assignment
  • Best practices for managing roles across projects

Lab 7 – Configuring Project Roles (30 min)

  • Exercise: Add/remove project roles
  • Exercise: Assign permissions to roles

Jira Essentials with Agile Mindset

1. Agile & Jira Foundations

  • Agile concepts: Agile as a mindset, iterative planning, continuous improvement, and team empowerment.
  • Jira basics: Explanation of projects, work items, boards, and key user roles (administrators, project admins, and team members).
  • Key takeaway: Jira is a flexible tool that aligns with agile principles to help teams visualize, plan, and track work effectively.

2. Visualizing and Managing Work

  • Boards and workflows: Boards represent the workflow, with columns tied to statuses (e.g., To Do, In Progress, Done).
  • Work item movement: Changing columns updates a work item’s status, keeping progress transparent.
  • Reports and dashboards: Dashboards and reports are introduced for visibility into progress and bottlenecks.

3. Enriching Work Items

  • Adding detail: Use labels, attachments, time logging, estimates, and comments to provide context.
  • Work types: Stories, tasks, bugs, epics, and subtasks, including hierarchy and when to use each.
  • Developer integration: Linking commits, branches, and builds to work items for better traceability.

4. Kanban Method

  • Flow and WIP limits: Limiting work in progress improves focus and identifies bottlenecks.
  • Pull vs. push: Pull systems empower teams to choose work as capacity allows.
  • Continuous prioritization: Kanban supports steady delivery and incremental improvement.

5. Scrum Method

  • Artifacts: Product backlog, sprint backlog, and increments for managing scope and progress.
  • Sprints and velocity: Time-boxed work, story point estimation, and using velocity for planning.
  • Roles and events: Responsibilities of product owners, scrum masters, and teams; ceremonies like sprint planning, daily standups, reviews, and retrospectives.

6. Searching and Filtering

  • Quick and basic search: Searching by keywords or fields to locate work items quickly.
  • Filters and quick filters: Saved searches to personalize views or refine boards and reports.
  • Bulk actions: Performing changes on multiple items simultaneously for efficiency.

7. Working with Epics

  • Organizing work: Grouping related work items under a higher-level epic.
  • Tracking progress: Epic panels, swimlanes, and reporting help visualize epic completion.
  • Managing relationships: Using the “Parent” field to link related items.

8. Dashboards and Reporting

  • Custom dashboards: Configurable views for projects, teams, or individuals.
  • Gadgets: Adding charts, lists, and other components to track KPIs.
  • Sharing dashboards: Personal vs. shared dashboards to support collaboration.

9. Lean and Agile Principles

  • Toyota Production System: Roots of lean thinking, kanban, and continuous improvement.
  • Lean principles: Limiting WIP, mapping value streams, eliminating waste, and building quality in.
  • Agile Manifesto alignment: Empowering teams, embracing change, delivering incrementally, and maintaining sustainable pace.
  • Combined mindset: Lean provides the foundation; agile builds on it to handle complexity and rapid change.

10. Capstone & Integration

  • Hands-on exercises: Practice applying principles by configuring projects and workflows.
  • Jira family overview: Brief orientation on Jira Software, Jira Service Management, and Product Discovery.
  • Key outcome: Confidence to adapt Jira setups to unique team processes while maintaining agile and lean alignment.

Managing Jira Service Projects (JSM)

Course Introduction

  • Course Goals and Learning Objectives
  • Prerequisites and Success Guidelines
  • Course Schedule and Structure
  •  Lab 1 – Logging into your site

Creating a Service Project

  • Overview of Jira Service Management
  • Service Project Use Cases (IT, HR, Internal Teams)
  • Jira Roles and Responsibilities (Admins, Agents, Customers)
  • Creating and Configuring a Service Project
  • Lab 2 – Creating a Service Project

Requests and Queues

  • Setting Up and Customizing Request Types
  • Forms and Field Customization
  • Customizing Workflow Statuses
  • Creating and Managing Queues
  • Best Practices for Portal Usability
  • Exercise 1 – Setting Up Request Types
  • Exercise 2 – Creating & Managing Queues
  • Lab 3 – Requests & Queues

Configuring SLAs

  • SLA Components (Metrics, Goals, Timeframes)
  • Preconfigured and Custom SLA Examples
  • SLA Calendars and Global Support Models
  • Monitoring SLAs with Reports, JQL, and Dashboards
  • Exercise 1 – Configuring SLAs
  • Exercise 2 – Creating an SLA Monitoring Dashboard
  • Lab 4 – Configuring SLAs

Using a Knowledge Base

  • Benefits of a Knowledge Base for Customers and Agents
  • Integrating Confluence with Jira
  • Configuring Article Suggestions and Access
  • Creating and Sharing Knowledge Base Articles
  • Exercise 1 – Using a Knowledge Base
  • Lab 5 – Using a Knowledge Base

Customizing Email Channel & Customer Portal

  • Setting Up and Customizing the Email Channel
  • Customizing Notifications and Request Type Mapping
  • Branding the Customer Portal
  • Branding the Global Help Center
  • Exercise 1 – Branding Your Customer Portal
  • Optional Exercise 2 – Branding Your Help Center
  • Optional Exercise 3 – Changing Your Project Logo
  • Lab 6 – Branding Your Customer Portal

Adding Users to Your Service Project

  • Adding and Managing Agents
  • Adding Customers and Customer Organizations
  • Configuring Customer Permissions
  • Involving Jira Users in the Workflow
  • Exercise 1 – Adding Users to Your Service Project
  • Exercise 2 – Adding Customers to Your Service Project
  • Lab 7 – Adding Users to Your Service Project

Automating Your Service Project

  • Overview of Jira Automation and Its Benefits
  • Building Automation Rules (Triggers, Conditions, Actions)
  • Using Smart Values and Rule Testing
  • Jira Service Management Template Rules and Advanced Triggers
  • Exercise 1 – View Jira Service Management Automation
  • Exercise 2 – Create a New Jira Service Management Automation Rule
  • Exercise 3 – Setting Up a New Preset Automation Rule
  • Exercise 4 – Troubleshooting Automation Rules & SLAs
  • Lab 8 – Automating Your Service Project

BigPicture Training and Implementation Bundle

Option 1 – BigPicture Express Launch Bundle (5 Days)

  • System implementation
    • Training (2 days)
    • Collecting requirements
    • Environment configuration
      • Building templates (Box and Task templates)
      • Configuration of reports in Big Picture
    • Supplementary training for "Core users"
  • Deliverables after implementation:
    • List of best practices
    • Training recording
  • Regular open meetings for our Clients
  • Certificate after training

Option 2 – BigPicture Excellence Implementation Bundle (12 Days)

  • System implementation
    • Training (3 days)
    • Collecting requirements
    • Tool configuration
      • Building templates (Box and Task templates)
      • Configuration of reports in Big Picture + custom reports
      • Automation
    • Supplementary training for "Core users"
    • Training for "Basic users"
  • Assistance 4 weeks after implementation
  • Deliverables after implementation:
    • List of best practices
    • Training recording
  • Regular open meetings for our Clients
  • Training for the Top management
  • Certificate after training
  • Support in Migration and Integration

Option 3 – BigPicture Premium Bundle (26 Days)

  • System implementation
    • Training (3 days)
    • Collecting requirements
    • Tool configuration
      • Building templates (Box and Task templates)
      • Configuration of reports in Big Picture + custom reports
      • Automation
    • Supplementary training for "Core users"
    • Training for "Basic users"
  • Assistance 4 weeks after implementation
  • Long-term support after implementation for the stabilization period of 3 months
  • Deliverables after implementation:
    • Deployment configuration documentation
    • List of best practices
    • Training recording
  • Individual consultations for selected PMs or Teams
  • Regular open meetings for our Clients
  • Training for the Top management
  • Training for Project Managers
  • Certificate after the training
  • Support in Integration and Data Migration

Cybersecurity for Executives

1. Introduction to Cybersecurity

1.1. Understanding Cybersecurity

o  Definition and importance of cybersecurity in today's business landscape

o  The role of cybersecurity in protecting company assets and reputation

1.2. Executive Responsibilities in Cybersecurity

o  The importance of leadership in cybersecurity

o  Legal and regulatory obligations for executives

2. The Current Threat Landscape

2.1. Overview of Cyber Threats

o  Types of cyber threats (malware, phishing, ransomware, insider threats)

o  Emerging threats and trends in cybercrime

2.2. Case Studies

o  High-profile cyberattacks and their impact on businesses

o  Lessons learned from recent breaches

3. Risk Management and Cybersecurity Strategy

3.1. Identifying and Assessing Cyber Risks

o  How to identify and assess risks to the organization

o  The role of risk management in cybersecurity

3.2. Developing a Cybersecurity Strategy

o  Key components of an effective cybersecurity strategy

o  Aligning your cybersecurity strategy with business objectives

4. Cybersecurity Governance and Compliance

4.1. Governance Frameworks

o  Implementing proven frameworks

o  Overview of governance frameworks (NIST, ISO 27001, COBIT)

o  Executive-level support of the cybersecurity process

4.2. Regulatory Compliance

o  Overview of relevant regulations (GDPR, CCPA, HIPAA, etc.)

o  Ensuring compliance and avoiding legal pitfalls

 

5. Building a Cybersecurity Culture

5.1. Fostering Cybersecurity Awareness

o  The importance of a security-conscious culture

o  Strategies for promoting cybersecurity awareness among employees and contractors

5.2. Training and Education

o  Executive role in ensuring ongoing cybersecurity education

o  Best practices for training programs and simulations

o  Training as a countermeasure for insider threats

6. Incident Response and Crisis Management

6.1. Incident Response Planning

o  Developing an incident response plan

o  Roles and responsibilities before and during a cybersecurity incident

6.2. Crisis Management

o  Communication strategies during a cyber crisis

o  Handling public relations and maintaining trust

7. Cybersecurity Investment and Budgeting

7.1. Evaluating Cybersecurity Investments

o  Overview of the cybersecurity tools landscape

o  Assessing ROI for cybersecurity tools and services

o  Prioritizing cybersecurity spending based on risk

7.2. Budgeting for Cybersecurity

o  Allocating resources effectively for cybersecurity

o  Justifying cybersecurity budgets to stakeholders

8. The Future of Cybersecurity

8.1. Emerging Technologies and Threats

o  The impact of AI, IoT, and quantum computing on cybersecurity

o  Preparing for future challenges

8.2. The Evolving Role of Executives

o  How the executive role in cybersecurity is changing

o  Continuous learning and adaptation in cybersecurity leadership

Cybersecurity for Developers

1. Introduction to Secure Development

1.1. The Importance of Secure Coding

  • Overview of cybersecurity in software development
  • The impact of insecure code on organizations and users

1.2. Developer Responsibilities in Cybersecurity

  • Understanding the developer's role in maintaining security
  • Security as a key part of the Software Development Lifecycle (SDLC)

2. Understanding Common Vulnerabilities

2.1. OWASP Top Ten Vulnerabilities

  • Definition and importance of OWASP
  • Overview of the OWASP Top Ten (e.g., SQL injection, XSS, CSRF)
  • Examples and impact of each vulnerability

2.2. Vulnerability Examples

  • Real-world cases of security breaches due to poor coding practices
  • Impact on companies and their employees from breaches
  • Analysis of how these breaches could have been prevented

2.3. Secure Coding Standards

  • Introduction to secure coding guidelines (e.g., CERT, SANS)
  • How to apply these standards in everyday coding practices

3. Secure Development Practices

3.1. Input Validation and Sanitization

  • Importance of validating and sanitizing user inputs
  • Techniques for preventing injection attacks (SQL, command, etc.)

3.2. Authentication and Authorization

  • Best practices for implementing secure authentication mechanisms
  • Managing authorization, authentication, user roles, and permissions securely

3.3. Data Encryption and Protection

  • How and when to use encryption to protect sensitive data
  • Secure storage and transmission of data at rest, in transit, and in use (e.g., HTTPS, SSL/TLS)

3.4. Error Handling and Logging

  • Importance of secure error handling to avoid information leakage
  • Best practices for logging without exposing sensitive information

4. Secure Software Development Lifecycle (SDLC)

4.1. Integrating Security into the SDLC

  • Overview of secure SDLC frameworks (e.g., Microsoft SDL, BSIMM)
  • Key stages where security should be integrated (planning, design, coding, testing)

4.2. Threat Modeling

  • Introduction to threat modeling and its importance
  • Tools and techniques for identifying potential threats early in the development process

4.3. Code Reviews and Static Analysis

  • Conducting secure code reviews and peer assessments
  • Using static analysis tools to identify vulnerabilities in code

5. Secure Development Tools and Resources

5.1. Security Testing Tools

  • Overview of tools for security testing (e.g., OWASP ZAP, Burp Suite)
  • How to integrate these tools into the development process

5.2. Dependency Management and Software Composition Analysis (SCA)

  • Importance of managing third-party libraries and dependencies
  • Tools for identifying vulnerabilities in open-source components

5.3. Continuous Integration/Continuous Deployment (CI/CD)

  • Securing the CI/CD pipeline
  • Best practices for automated security testing in CI/CD environments

6. Web Application Security

6.1. Securing Web Applications

  • Best practices for securing web applications (e.g., secure session management, CSRF protection)
  • Importance of HTTPS and secure cookie handling

6.2. API Security

  • Best practices for designing secure APIs (e.g., authentication, rate limiting)
  • Common API vulnerabilities and how to prevent them

6.3. Mobile Application Security

  • Overview of security considerations for mobile apps
  • Techniques for securing data on mobile devices

7. Incident Response and Handling Vulnerabilities

7.1. Security Incident Response for Developers

  • How developers should respond to security incidents
  • Role of developers in post-incident analysis and patching

7.2. Reporting and Managing Vulnerabilities

  • Best practices for reporting security vulnerabilities in code
  • Coordinating with security teams to address and remediate vulnerabilities

8. Continuous Learning and Staying Updated

8.1. Keeping Up with Security Trends

  • Importance of staying informed about the latest security threats and trends
  • Resources for continuous learning (blogs, forums, security conferences)

8.2. Community Involvement

  • Participating in security communities (e.g., OWASP, local meetups)
  • Contributing to open-source security projects