Welcome to this course: CISSP Certification Domain 3 & 4 - Security Architecture and Engineering & Communication and Network Security. Organizations today are concerned with a myriad of potential security issues, including those pertaining to the confidential data stored in their databases. This course consists of security design principles that are the building blocks of secure software, hardware, and networking products. This course also addresses best practices, proven models, and processes that can be adapted during product design. This course covers security engineering from the ground up. It then goes into how systems are evaluated and rated by governments and other agencies, and what these ratings actually mean. Networking is one of the more complex topics in the computer field, mainly because so many technologies are involved and are evolving. This course will cover foundational concepts in network architecture and network security. IP and non-IP protocols, their application, threats, attacks, vulnerabilities, and countermeasures are covered with suitable examples. Our current technologies are constantly evolving, and every month there seems to be new “emerging” technologies that we have to learn, understand, implement, and secure.
In this course, you'll learn:
Implement and manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls based upon systems security requirements
Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Assess and mitigate vulnerabilities in web-based systems
Assess and mitigate vulnerabilities in mobile systems
Assess and mitigate vulnerabilities in embedded devices
Apply cryptography
Apply security principles to site and facility design
Implement site and facility security controls
Implement secure design principles in network architectures
Secure network components
Implement secure communication channels according to design