Threat modeling[Classroom-Belfast]
Threat modeling helps to find vulnerabilities and to consider, document and discuss the
security implications of design, code and configurations.
Develop an architecture that ensures reliability and safety of the information systems
design of an organization.
- Classify and install physical and logical access controls, allowing your organization’s
information security model to detect, prevent and respond to any suspicious activity.
- Understand and explain how cryptography can protect organizational data and
communication from external and internal threats, and your ability to implement it.
- Choose products for organizational communication in accordance with its policies and
standards, and implement and monitor for optimal performance.
- Understand and identify adverse events that may result in threatening the normal
functioning of the organization.
CBSE designates knowledgeable technology professionals in the field of biometric
security. This program is designed for those who wish to gain a solid understanding of
biometric technologies and apply concepts and COTS tools to improve logical and
physical access control in identity management systems.
Ideal candidates for this program include security architects, Biometric Analysts,
IT Security engineers, information assurance consultants, program managers and other
individuals with experience and expertise in information security related domains.
CISSP® - Certified Information Systems Security Professional Training
Carte 2013
Attend Carte France
Exhibition + 3 conferences days
April 2012
Ilex Single Sign-on (Sign&Go 4.3) training :
Smart Cards Management
SAML implementation and configuration
Oracle/Passlogix Certification: Certification on every Oracle/Passlogix Identity Access Management products (SSO, SSPR, PM,…)
The powerful and multi-criteria user access control, data classification, transparent encryption data, auditing, monitoring and hiding data from Oracle: User interface frameworks :
Oracle Identity Management (IDM)
Oracle Single Sign-on (SSO)
Oracle Transparent Data Encryption (TDE)
⦁ IAM (Identity and Access Management),
⦁ IBM Tivoli Identity Manager (ITIM) Presentation,
⦁ Ilex Meibo Presentation,
⦁ SSO, Cyber-Ark, Vault, PKI Presentations
IAM Architect :
Participate to develop a governmental Services Delivery Platform (SDP):
⦁ Request for Proposal (RFP) elaboration.
⦁ Business requirements definition.
⦁ Design the architecture of the IAM framework including (but not limited to) :
⦁ Provisioning
⦁ Authentication
⦁ Authorization
⦁ Web Single Sign-On (SSO)
⦁ Public Key Infrastructure (PKI)
⦁ Federation
⦁ Knowledge Base Authentication (KBA)
⦁ Evaluating then Selecting technology, solution and vendor.
⦁ Participate to all Agile lifecycle steps (meeting, BRS, SRS, HLD, LLD…).
⦁ Lead the architecture design of IAM items in all public and governmental projects.
⦁ …
Lead and Participate to the all projects/opportunities related to :
⦁ Smart card
⦁ Biometric
⦁ PKI
⦁ …
Lead the WSO2 part in the projects :
⦁ Products selection
⦁ Architecture
⦁ Vendor handling
⦁ Trainings
⦁ …
Lead Demos and POC (Proof Of Concept ) related to :
⦁ Smart card
⦁ Biometric
⦁ PKI
⦁ …
Lead the Security Software Development Life Cycle S-SDLC :
⦁ Elaborate process
⦁ Identify gaps
⦁ Propose/conduct trainings
⦁ …