Course Outline
Programme
Module 1: Principles of Modeling
- Concepts and definitions. Types of Cybersecurity processes: operational and governance. Control flow patterns. Objectives of BPMN 2.0.
Module 2: Presentation of the modeling tool
- The training workshops are done on the Signavio Process Manager tool. It can be done on the modeling tool already used by the company.
Module 3: Level 1 Modeling
- Task types (user, script, service, send, receive). Business rules and business rule tasks. Types of sub-processes (built-in, events, ad-hoc, transactions) Types of reusable sub-processes (built-in, call activities). Data gateways. Types of events: start, end, intermediate.
Workshops: process modeling in Cybersecurity.
Module 4: Level 2 Modeling
- Collaborations between processes: messages and signals. Intermediate events: in the flow, or at the border (of a task or a sub-process). Event gateways. Complex gateways. Repetitive activities: loop, multi-instance.
Workshops: modeling of more complex Cybersecurity processes.
Module 5: Modeling Best Practices
- Basic modeling principles. Model hierarchy. Labels of basins, footbridges, activities, events. Basic rules of use.
Module 6: Processes Become Applications
- Modeling and execution of a process.
Workshops: demo of a process transformed into a business application, with Oracle BPM.
Requirements
There are no specific requirements needed to attend this course.
Testimonials (10)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.
Gergely Bathó - GE Medical Systems Polska Sp. Z O.O.
Course - Application Security for Developers
The Burpe suite i need more training in this
Gontse Ntshegi - Vodacom
Course - Android Security
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job
Toby
Course - Application Security in the Cloud
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated