About | Courses | Seminars | Self-study tools | Related sites | Contact us |
Course Dates
- October 1 - October 5, 2012
(FRB Chicago) Course Full
IT Supervisory Themes and Emerging TopicsS.T.R.E.A.M/Technology Lab Courses - The Federal Reserve Bank of Chicago
Type of Participant Targeted
IT Supervisory Themes and Emerging Topics (STET) is a one-week course. The course is suitable both for newer examiners looking for some introduction to various IT topics, and experienced examiners who have encountered these issues and could benefit from further collaboration with other examiners.
Prerequisites
None.
Course Overview
This course is designed to highlight emerging topics in information technology in a condensed and discussion-oriented format. Topics include virtualization risks, wireless, voice over IP, remote deposit capture, cloud computing, social media risks and controls, and data leak prevention. The class modules are dynamically developed based on evolving IT operational risks and newfound IT exam issues. Therefore, each class may have different focus areas based on latest IT trends. This course offers 28 credit hours.
Course Objectives
Upon completion of this course, the participant, at a minimum, will be able to
- Demonstrate a basic understanding of learned IT technology
- Identify strengths and weaknesses of various technologies
- Perform fundamental system administration and audit operations
- Evaluate and report efficiency of various security controls to protect technology operations
Post-Course Intervention
Participants should be provided with opportunities that allow them to identify security capabilities and limitations associated with computer operating systems within a financial institution. They should review security measurements and recommend proper security controls to protect technology operations.
Curriculum Overview
Subject | Approximate Class Hours |
---|---|
Virtualization and Risks | 5.0 |
Remote Deposit Capture | 3.0 |
Cloud Computing | 3.0 |
Cloud Computing Vendor Management | 4.0 |
Wireless | 3.0 |
Voice Over IP | 4.0 |
Social Media Risks and Controls | 3.0 |
Data Leak Prevention | 2.0 |
Summary | 1.0 |
TOTAL | 28.0* |
* Note: The topics and hours may vary from class to class.
Learning Objectives
Participants develop a solid understanding of various technologies and identify security strengths and weaknesses in the technology implementations. Furthermore, participants evaluate the technology and its security measurement by reviewing, auditing, reporting and recommending proper security controls.
By module, the following learning objectives will be accomplished:
Module | Learning Objectives |
Virtualization and Risks |
|
Remote deposit capture |
|
Wireless and Hands-on Labs |
|
Cloud Computing |
|
Cloud Computing Vendor Management |
|
Voice over IP( VoIP) and Hands-on Labs |
|
Social Media Risks and Controls |
|
Data Leak Prevention |
|
Class Size
The optimum class size is approximately 20 participants. To provide sufficient variety of interaction among class participants, the minimum class size is 10 participants.
Instructors
The STET course is conducted and supported by a diverse group of professionals, including senior IT examiners, information security specialists, technology architects, and program managers from the FRS, FFIEC agencies, state banking supervision departments, and consulting firms.