Blue Team: Using Encryption for Product Security
>
IBM SkillsBuild
Experiences

Blue Team: Using Encryption for Product Security

Experience type:
Shadow Session
DATE:
to
Skills/Careers:
Threat Intelligence, Network Security
Join ExperienceJoin Waitlist
>
IBM SkillsBuild
Experiences

Blue Team: Using Encryption for Product Security

Experience type:
Shadow Session
Shadow Session
Shadow Sessions are 15 to 30 minute experiences where you can observe and interact with coaches as they showcase a highly relevant skill. Through this, you will learn it’s really like to be on-the-job!
DATE:
to
DATE:
Coming soon
Skills/Careers:
Threat Intelligence, Network Security

About this Experience

A cybersecurity analyst needs to master the fundamentals of ethical hacking. One practice is to role play as the red team (simulating a cyberattack) or as the blue team (maintaining system defenses during a hack). By working together red and blue teams provide a holistic security solution to defend a product and its affiliated data against evolving threats.

What You Will Do

In this Shadow Session you will watch the blue team responsible for defending a FinTech product develop a plan to protect financial records “upstream” through encryption. You will witness how the blue team determines which stage in the user journey to mount an encryption defense to ensure maximum effect without compromising the user’s experience.

What You Will Get

Who Will Support You

In this learning experience, you’ll receive guidance from working professionals currently working in the field of Cybersecurity. They’ll share their knowledge, expertise, and experience to help you understand how the challenge is approached in the real world. You’ll also connect with and learn from peer learners all seeking to explore new careers together.

Coaches details coming soon.
Aneesa Sobhy
Aneesa Sobhy
Lead Instructor at Evolve Security, Founder of the Capital Region chapter of Girls Who Code

What You Will Learn

In this experience, you will learn to:

  • Incorporate encryption as a product feature
  • Weigh the opportunities and tradeoffs of different defense strategies
  • Design a security solution that meets competing needs of multiple stakeholders
clicked symbol

Why Clicked is Different

At the core of Clicked experiences are the principles of communal learning, a safe environment where career explorers can take risks and try new things, and the idea that experiences should be fun.
It is not a class or competition. We know that a supportive learning community can help everyone launch a career, and we hope that you'll join us to experience it for yourself!
Blue Team: Using Encryption for Product Security
Sign Up for ClickedJoin Waitlist
Who is this experience for:
This experience is open to any and all learners interested in understanding more about the common activities of Cybersecurity professionals. No prior experience is necessary.
Supported Regions:
All regions
Individuals should be located in the
Other regions may apply and can join the waitlist to be notified of upcoming experiences
Location:
Virtual
Time Commitment:
30 minutes on the day of the event
Price:
Free - Sponsored by IBM SkillsBuild

Explore Your Possibilities