Security Engineering

The Security Engineering skills path teaches you concepts related to security architecture and engineering, including technical integration of enterprise security, security design and implementation, secure maintenance and disposal, and more.

Course

Stakeholder Requirements Definition

28 minutes

Course

Software Vulnerabilities and Security Controls

37 minutes

Course

Secure Storage Controls

29 minutes

Course

Securing Host Devices

20 minutes

Course

Network Security Components

44 minutes

Course

Technical Management Processes

1 hour, 46 minutes

Course

System Development Methodologies

43 minutes

Course

Acquisition Process

37 minutes

Course

Secure Disposal

31 minutes

Course

Secure Maintenance

50 minutes

Course

Secure Operations

1 hour, 1 minutes

Course

Verification and Validation of Systems or System Modifications

31 minutes

Course

Implementation, Integration, and Deployment of Systems or System Modifications

16 minutes

Course

System Security Architecture and Design

8 minutes

Course

Secure Software Development

43 minutes

They say an ounce of prevention is worth a pound of cure, and that’s what this course is about. Nine videos cover secure software development: from change control and software testing to software environment security, object-oriented programming, distributed computing, mobile code, malware and more, this course explores the details of ensuring that software development has security baked in right from the get-go. Take a closer look at software testing types, sample change control procedures and definitions of terms such as polyinstantiation and polymorphism.

Course

Requirements Analysis

17 minutes

Course

Secure Design Principles

39 minutes

Systems engineering applies through the entire process of development, from concept until final disposal. And to keep your system secure, you need to understand the principles of secure design. Nine modules take the student through security models, evaluation models, popular security models (such as Bell-LaPadula, State Machine, Clark & Wilson and more), common criteria and the certification and accreditation process, with quick stops at useful items such as the Rainbow Series and the secure design life cycle. Includes vocabulary, definitions, lattice diagrams and even some notes on obsolete models.

Course

Operational Risk Management

1 hour, 11 minutes

Course

Risk Management Process

2 hours, 17 minutes

Course

Vulnerability Management Principles

32 minutes

Course

Disaster Recovery

36 minutes

When trouble strikes, your preparations could mean the difference between disaster and a bump in the road. Review disaster recovery with six videos: Recovery Strategy, Recovery Process, Disaster Recovery Plan Testing, RAID (Redundant Array of Inexpensive Disks), Backups and Network Redundancy. Explore the development process for a disaster recovery strategy, look at the different models of disaster recovery plans and fallback sites, and compare Mean Time Between Failure (MTBF) and Mean Time to Repair (MTTR). Remember: “Nine-tenths of wisdom is being wise in time.”

Course

Business Continuity Planning

19 minutes

It’s an old saying: hope for the best, plan for the worst. Business continuity planning means planning for the worst. Three modules take the student through the details of making sure your company continues operations: creating incident response plans and contingency plans, conducting a Business Impact Analysis (BIA), the National Institute of Standards and Technology’s Seven Steps to Continuity Planning and more. Learn the stages of incident management, the key metrics developed in a BIA and the ins-and-outs of recovery plans.

Course

System Resilience Principles

26 minutes

Course

Risk Management Principles

15 minutes

Course

General Security Principles

1 hour, 0 minutes

Course

Distributed System & Virtualized Networks

20 minutes

Take a closer look at distributed systems and virtualized networks with this four-video course. Beginning with Virtual Private Networks (VPNs) and Virtualized Local Area Networks (VLANs), the student will be introduced to the fundamentals of distributed and cloud computing, virtualization and virtualized networks. Why is virtualization a good choice, and what are its weaknesses? What’s the difference between Infrastructure-as-a-Service and Platform-as-a-Service? Includes definitions and diagrams.

Course

Secure Network Design

26 minutes

Securing a network is a lot like securing a building: there are many possible protection mechanisms, and even more possible ways for the intruder to get in. In this course, six videos take the student through the essentials of secure network design. From firewalls and the so-called demilitarized zone (DMZ) to honeypots, honeytokens and honeynets, endpoint security and the many flavors of authentication protocol, learn to identify the potential chinks in a system’s armor — and how to make them secure.

Course

WAN & Remote Access Security

33 minutes

When it comes to wireless networks and remote access security, there are several threats you need to be on the lookout for. Bluesnarfing, Man-in-the-Middle attacks and the dangers of obsolete protocols are just a few. In this five-video course, the student will review WAN and remote access security: wireless networks, mobile systems, WAN technologies, remote access and secure communication protocols. This course also includes diagrams, vocabulary, definitions, protocol lists and examples.

Course

Data Center Security

21 minutes

Take a closer look at data center security with four videos covering the big picture of data center security, media storage, fire safety and utilities and HVAC (heating, ventilation and air conditioning) systems. Why is prevention the best solution for fire? What’s the difference between a safe, a vault and a container, and why does it matter? Full details on everything you need to know about data center security and protecting your organization’s servers from disaster.

Course

Physical Security

52 minutes

Physical security is any organization’s first line of defense, and understanding it is key. Learn the hows and whys of physical security with eight videos covering facility design and construction, perimeter defenses, internal facilities security, physical intrusion detection, personnel safety and more. Discover the difference between deterrent, detective and preventive controls, and learn about crime prevention through environmental design (CPTED), piggybacking, tailgating, defense-in-depth in physical security and appropriate choices of locks and keys.

Course

System Protection Mechanisms

32 minutes

Well-designed systems will always attempt to protect themselves, but they can’t do it alone. And that’s where you come in. Seven videos introduce the student to the fundamentals of system protection mechanisms, beginning with Trusted Computing Base (TCB) and covering common architecture flaws, Web-based vulnerabilities, covert channels, embedded systems and more. Compare and contrast open and closed systems, look at the five protection rings of a system and even refresh your knowledge of computer components with this course!