Course Outline

Programme

Module 1: Principles of Modeling

    Concepts and definitions. Types of Cybersecurity processes: operational and governance. Control flow patterns. Objectives of BPMN 2.0.

Module 2: Presentation of the modeling tool

    The training workshops are done on the Signavio Process Manager tool. It can be done on the modeling tool already used by the company.

Module 3: Level 1 Modeling

    Task types (user, script, service, send, receive). Business rules and business rule tasks. Types of sub-processes (built-in, events, ad-hoc, transactions) Types of reusable sub-processes (built-in, call activities). Data gateways. Types of events: start, end, intermediate.

Workshops: process modeling in Cybersecurity.

Module 4: Level 2 Modeling

    Collaborations between processes: messages and signals. Intermediate events: in the flow, or at the border (of a task or a sub-process). Event gateways. Complex gateways. Repetitive activities: loop, multi-instance.

Workshops: modeling of more complex Cybersecurity processes.

Module 5: Modeling Best Practices

    Basic modeling principles. Model hierarchy. Labels of basins, footbridges, activities, events. Basic rules of use.

Module 6: Processes Become Applications

    Modeling and execution of a process.

Workshops: demo of a process transformed into a business application, with Oracle BPM.

Requirements

There are no specific requirements needed to attend this course.

 21 Hours

Number of participants



Price per participant

Testimonials (10)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

Android Security

14 Hours

Comprehensive C# and .NET Application Security

21 Hours

Network Security and Secure Communication

21 Hours

Combined C/C++, JAVA and Web Application Security

28 Hours

Application Security in the Cloud

21 Hours

Related Categories