Cryptography is the science of securing information, and in today’s security-obsessed world, cryptography is more important than ever. In eight videos, the student explores the fundamentals of symmetric and asymmetric cryptography, cryptographic attacks, hybrid cryptography, ciphers and more. This course offers vocabulary and definitions, example diagrams, a close look at cryptographic algorithms and everything you ever wanted to know about keys. We also touch on the CIA triad and the use of hashing and digital signatures to ensure confidentiality, integrity and non-repudiation.
They say an ounce of prevention is worth a pound of cure, and that’s what this course is about. Nine videos cover secure software development: from change control and software testing to software environment security, object-oriented programming, distributed computing, mobile code, malware and more, this course explores the details of ensuring that software development has security baked in right from the get-go. Take a closer look at software testing types, sample change control procedures and definitions of terms such as polyinstantiation and polymorphism.
Four videos cover the ins and outs of secure software design. Beginning with an introductory module on secure software design, we move on to secure system development life cycle (SDLC), software development models and maturity models. Take a closer look at the waterfall method, the spiral model, the agile software development method and more.
Take a closer look at distributed systems and virtualized networks with this four-video course. Beginning with Virtual Private Networks (VPNs) and Virtualized Local Area Networks (VLANs), the student will be introduced to the fundamentals of distributed and cloud computing, virtualization and virtualized networks. Why is virtualization a good choice, and what are its weaknesses? What’s the difference between Infrastructure-as-a-Service and Platform-as-a-Service? Includes definitions and diagrams.
Take a closer look at data center security with four videos covering the big picture of data center security, media storage, fire safety and utilities and HVAC (heating, ventilation and air conditioning) systems. Why is prevention the best solution for fire? What’s the difference between a safe, a vault and a container, and why does it matter? Full details on everything you need to know about data center security and protecting your organization’s servers from disaster.
Physical security is any organization’s first line of defense, and understanding it is key. Learn the hows and whys of physical security with eight videos covering facility design and construction, perimeter defenses, internal facilities security, physical intrusion detection, personnel safety and more. Discover the difference between deterrent, detective and preventive controls, and learn about crime prevention through environmental design (CPTED), piggybacking, tailgating, defense-in-depth in physical security and appropriate choices of locks and keys.
Systems engineering applies through the entire process of development, from concept until final disposal. And to keep your system secure, you need to understand the principles of secure design. Nine modules take the student through security models, evaluation models, popular security models (such as Bell-LaPadula, State Machine, Clark & Wilson and more), common criteria and the certification and accreditation process, with quick stops at useful items such as the Rainbow Series and the secure design life cycle. Includes vocabulary, definitions, lattice diagrams and even some notes on obsolete models.