They say an ounce of prevention is worth a pound of cure, and that’s what this course is about. Nine videos cover secure software development: from change control and software testing to software environment security, object-oriented programming, distributed computing, mobile code, malware and more, this course explores the details of ensuring that software development has security baked in right from the get-go. Take a closer look at software testing types, sample change control procedures and definitions of terms such as polyinstantiation and polymorphism.
Systems engineering applies through the entire process of development, from concept until final disposal. And to keep your system secure, you need to understand the principles of secure design. Nine modules take the student through security models, evaluation models, popular security models (such as Bell-LaPadula, State Machine, Clark & Wilson and more), common criteria and the certification and accreditation process, with quick stops at useful items such as the Rainbow Series and the secure design life cycle. Includes vocabulary, definitions, lattice diagrams and even some notes on obsolete models.
When trouble strikes, your preparations could mean the difference between disaster and a bump in the road. Review disaster recovery with six videos: Recovery Strategy, Recovery Process, Disaster Recovery Plan Testing, RAID (Redundant Array of Inexpensive Disks), Backups and Network Redundancy. Explore the development process for a disaster recovery strategy, look at the different models of disaster recovery plans and fallback sites, and compare Mean Time Between Failure (MTBF) and Mean Time to Repair (MTTR). Remember: “Nine-tenths of wisdom is being wise in time.”
It’s an old saying: hope for the best, plan for the worst. Business continuity planning means planning for the worst. Three modules take the student through the details of making sure your company continues operations: creating incident response plans and contingency plans, conducting a Business Impact Analysis (BIA), the National Institute of Standards and Technology’s Seven Steps to Continuity Planning and more. Learn the stages of incident management, the key metrics developed in a BIA and the ins-and-outs of recovery plans.
Take a closer look at distributed systems and virtualized networks with this four-video course. Beginning with Virtual Private Networks (VPNs) and Virtualized Local Area Networks (VLANs), the student will be introduced to the fundamentals of distributed and cloud computing, virtualization and virtualized networks. Why is virtualization a good choice, and what are its weaknesses? What’s the difference between Infrastructure-as-a-Service and Platform-as-a-Service? Includes definitions and diagrams.
Securing a network is a lot like securing a building: there are many possible protection mechanisms, and even more possible ways for the intruder to get in. In this course, six videos take the student through the essentials of secure network design. From firewalls and the so-called demilitarized zone (DMZ) to honeypots, honeytokens and honeynets, endpoint security and the many flavors of authentication protocol, learn to identify the potential chinks in a system’s armor — and how to make them secure.
When it comes to wireless networks and remote access security, there are several threats you need to be on the lookout for. Bluesnarfing, Man-in-the-Middle attacks and the dangers of obsolete protocols are just a few. In this five-video course, the student will review WAN and remote access security: wireless networks, mobile systems, WAN technologies, remote access and secure communication protocols. This course also includes diagrams, vocabulary, definitions, protocol lists and examples.
Take a closer look at data center security with four videos covering the big picture of data center security, media storage, fire safety and utilities and HVAC (heating, ventilation and air conditioning) systems. Why is prevention the best solution for fire? What’s the difference between a safe, a vault and a container, and why does it matter? Full details on everything you need to know about data center security and protecting your organization’s servers from disaster.
Physical security is any organization’s first line of defense, and understanding it is key. Learn the hows and whys of physical security with eight videos covering facility design and construction, perimeter defenses, internal facilities security, physical intrusion detection, personnel safety and more. Discover the difference between deterrent, detective and preventive controls, and learn about crime prevention through environmental design (CPTED), piggybacking, tailgating, defense-in-depth in physical security and appropriate choices of locks and keys.
Well-designed systems will always attempt to protect themselves, but they can’t do it alone. And that’s where you come in. Seven videos introduce the student to the fundamentals of system protection mechanisms, beginning with Trusted Computing Base (TCB) and covering common architecture flaws, Web-based vulnerabilities, covert channels, embedded systems and more. Compare and contrast open and closed systems, look at the five protection rings of a system and even refresh your knowledge of computer components with this course!