CISSP – Domain 3 – Security Engineering
CISSP – Domain 3 – Security Engineering, available at $19.99, with 66 lectures, 1 quizzes, and has 3 subscribers.
You will learn about Understanding Information Security Concepts in Domain 3 – Security Engineering Using Security Design Principles in The Engineering Lifecycle Understanding Fundamental Concepts of Security Models Exploring Information Systems Security Evaluation Models Ensuring Security Capabilities of Information Systems Discovering Vulnerabilities of Security Architectures Securing Databases Analyzing Vulnerabilities and Threats Applying and Using Cryptography Site Planning Site Planning Implementing and Operating Facilities Security This course is ideal for individuals who are Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate It is particularly useful for Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate.
Enroll now: CISSP – Domain 3 – Security Engineering
Summary
Title: CISSP – Domain 3 – Security Engineering
Price: $19.99
Number of Lectures: 66
Number of Quizzes: 1
Number of Published Lectures: 66
Number of Published Quizzes: 1
Number of Curriculum Items: 67
Number of Published Curriculum Objects: 67
Original Price: $34.99
Quality Status: approved
Status: Live
What You Will Learn
- Understanding Information Security Concepts in Domain 3 – Security Engineering
- Using Security Design Principles in The Engineering Lifecycle
- Understanding Fundamental Concepts of Security Models
- Exploring Information Systems Security Evaluation Models
- Ensuring Security Capabilities of Information Systems
- Discovering Vulnerabilities of Security Architectures
- Securing Databases
- Analyzing Vulnerabilities and Threats
- Applying and Using Cryptography
- Site Planning
- Site Planning Implementing and Operating Facilities Security
Who Should Attend
- Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate
Target Audiences
- Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate
CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 3 – Security Engineering. Engineering is about understanding and designing systems that work. Security is a fundamental part of any well designed system. This domain will help you understand the engineering lifecycle and various models and security components required in data structures and physical facilities. We also learn how cryptography fits in to information security.
With nearly 10,000 training videos available for desktop applications, technical concepts, and business skills that comprise hundreds of courses, Intellezy has many of the videos and courses you and your workforce needs to stay relevant and take your skills to the next level. Our video content is engaging and offers assessments that can be used to test knowledge levels pre and/or post course. Our training content is also frequently refreshed to keep current with changes in the software. This ensures you and your employees get the most up-to-date information and techniques for success. And, because our video development is in-house, we can adapt quickly and create custom content for a more exclusive approach to software and computer system roll-outs.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Chapter 2: Using Security Design Principles in The Engineering Lifecycle
Lecture 1: Systems Engineering
Chapter 3: Understanding Fundamental Concepts of Security Models
Lecture 1: Common System Components
Lecture 2: Enterprise Security Architecture
Lecture 3: Common Architecture Frameworks
Lecture 4: Introducing Types of Security Models
Lecture 5: The Bell-LaPadula Confidentiality Model
Lecture 6: The Biba Integrity Model
Lecture 7: The Clark-Wilson Integrity Model
Lecture 8: Other Types of Security Models
Lecture 9: Capturing and Analyzing Requirements
Lecture 10: Creating and Documenting Security Architecture
Chapter 4: Exploring Information Systems Security Evaluation Models
Lecture 1: Common Formal Security Models
Lecture 2: Trusted Computer System Evaluation Criteria
Lecture 3: Information Technology Security Evaluation Criteria
Lecture 4: The Common Criteria
Lecture 5: Industry and International Security Implementation Guidelines
Chapter 5: Ensuring Security Capabilities of Information Systems
Lecture 1: Access Control Mechanisms
Lecture 2: Secure Memory Management
Chapter 6: Discovering Vulnerabilities of Security Architectures
Lecture 1: Systems
Lecture 2: Technology and Process Integration
Lecture 3: Single Point of Failure (SPOF)
Lecture 4: Client-Based Vulnerabilities
Lecture 5: Server-Based Vulnerabilities
Chapter 7: Database Security
Lecture 1: Database Security
Lecture 2: Large Scale Parallel Data Systems
Lecture 3: Distributed Systems
Lecture 4: Rapid Elasticity
Lecture 5: Cryptographic Systems
Lecture 6: Stream-Based Ciphers
Lecture 7: Block Ciphers
Lecture 8: Defining Symmetric Cryptography
Lecture 9: Counter Mode Algorithms
Lecture 10: Defining Asymmetric Cryptography
Lecture 11: Asymmetric Cryptography
Lecture 12: Hashing and Hybrid Cryptography
Chapter 8: Analyzing Vulnerabilities and Threats
Lecture 1: Web Based
Lecture 2: Risks from Remote Computing
Lecture 3: Risks from Mobile Workers
Lecture 4: Embedded Cyber Physical Systems (CPS)
Chapter 9: The Application and Use of Cryptography
Lecture 1: The History of Cryptography
Lecture 2: Emerging Technology
Lecture 3: Core Information Security Principles
Lecture 4: Additional Features of Cryptographic Systems
Lecture 5: The Cryptographic Lifecycle
Lecture 6: Public Key Infrastructure (PKI)
Lecture 7: Key Management Process
Lecture 8: Creation and Distribution of Keys
Lecture 9: Digital Signatures
Lecture 10: Digital Rights Management (DRM)
Lecture 11: Non-Repudiation
Lecture 12: Hashing
Lecture 13: Hash Functions
Lecture 14: Methods of Cryptanalytic Attacks
Chapter 10: Site Planning
Lecture 1: Roadway Design
Lecture 2: Crime Prevention through Environmental Design
Lecture 3: Windows
Lecture 4: Garages
Lecture 5: Location Threats
Chapter 11: Implementing and Operating Facilities Security
Lecture 1: Federal Emergency Management Agency (FEMA) Publications
Lecture 2: Communications and Server Rooms
Lecture 3: Restricted and Work Area Security
Lecture 4: Data Center Security
Chapter 12: Conclusion
Lecture 1: Course Recap
Chapter 13: CISSP – Domain 3 – Security Engineering Assessment
Chapter 14: BONUS LECTURES: Cyber Security for the End User Course
Lecture 1: Understanding Cyber Threats
Lecture 2: Using Email and Internet Wisely
Instructors
-
Intellezy Trainers
Multi-Award-Winning eLearning Specialists
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 0 votes
- 3 stars: 0 votes
- 4 stars: 0 votes
- 5 stars: 0 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024