{"id":54292,"date":"2014-04-21T08:04:47","date_gmt":"2014-04-21T13:04:47","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=54292"},"modified":"2014-04-21T08:25:19","modified_gmt":"2014-04-21T13:25:19","slug":"curacao-may-2014-advanced-level-security-risk-analysis-budgeting-tools","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/curacao-may-2014-advanced-level-security-risk-analysis-budgeting-tools\/","title":{"rendered":"Curacao – Advanced Level: Security Risk Analysis and Budgeting Tools"},"content":{"rendered":"
About the Advanced Level – Two day seminar:<\/strong><\/p>\n This ADVANCED-level “follow-on” course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks, vulnerabilities, and project roll-out upgrade costs. They will be able to provide a quality report with convincing arguments and findings, and with countermeasures selections that are reasonable and cost-effective.<\/p>\n <\/p>\n * Course Pre-requisite<\/strong><\/p>\n It is highly recommended that students first attend the pre-requisite seminar, \u201cCore Level: Physical Security & Vulnerability Assessments\u201d, OR have a thorough understanding of physical security components, countermeasures, and basic SANDIA National Laboratories E.A.S.I. model methodolog<\/p>\n","protected":false},"excerpt":{"rendered":" About the Advanced Level – Two day seminar: This ADVANCED-level “follow-on” course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[126,206,236,196],"class_list":["post-54292","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-curacao","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-ict-tech","tribe_events_cat-seminar","cat_curacao","cat_cybercrimecybersecurity-3","cat_ict-tech","cat_seminar"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=54292"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54292\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=54292"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=54292"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=54292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n