CISSP - Security Engineering
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
0 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CISSP - Security Engineering to your Wishlist.

Add to Wishlist

CISSP - Security Engineering

This course examines the development of information systems that remain secure in the face of a myriad of threats.
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
0 students enrolled
Last updated 9/2017
English
English [Auto-generated]
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 11 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Security design principles
  • Selection of effective controls
  • Mitigation of vulnerabilities
  • Cryptography
  • Secure site and facility design
  • Physical security
View Curriculum
Requirements
  • A PC or Mac
  • Working internet connection.
Description

Welcome to this course: CISSP Certification - Security Engineering. Organizations today are concerned with a myriad of potential security issues, including those pertaining to the confidential data stored in their databases. This course consists of security design principles that are the building blocks of secure software, hardware, and networking products. This course also addresses best practices, proven models, and processes that can be adapted during product design. This course covers security engineering from the ground up. It then goes into how systems are evaluated and rated by governments and other agencies, and what these ratings actually mean.

In this course, you'll learn:

  • Security design principles
  • Selection of effective controls
  • Mitigation of vulnerabilities
  • Cryptography
  • Secure site and facility design
  • Physical security

This course will help you to enter the exam room with confidence, knowing that you have done all you can to prepare for the big day. So let's get started.

Who is the target audience?
  • Security Manager
  • Security Architect
  • Security Analyst
  • Security Consultant
  • Security Systems Engineer
Students Who Viewed This Course Also Viewed
Curriculum For This Course
107 Lectures
11:05:15
+
Welcome
1 Lecture 04:20
+
Security Models
10 Lectures 01:11:41
Introduction
07:10

Intro to Bell-Lapadula
09:28

Intro to BIBA
08:12

Applying these Models
08:18

Clark - Wilson Model
06:46

Clark - Wilson Brewer - Nash Model
04:55

TCB
09:42

TCSEC
07:31

ITSEC
04:03

Common Criteria
05:36
+
Computer Hardware Architecture
7 Lectures 53:47
Introduction
06:55

CPU
07:02

Motherboard
05:27

Memory
07:04

Virtual Memory
09:59

Memory
07:50

TPM
09:30
+
Operating System Architecture
9 Lectures 01:07:57
Introduction
09:11

Architecture
06:03

Kernel Mode
07:14

Features
06:27

Processes Threads
09:02

Process and Memory Management
08:57

Reference Monitor
06:18

System Self Protection
06:50

Hardened Server
07:55
+
Virtualization
2 Lectures 17:21
Introduction
08:55

Virtualization
08:26
+
Information Systems
20 Lectures 01:57:18
Introduction
06:29

Architecture
04:49

Architecture in depth
07:21

Cloud Computing
05:13

Cloud Computing in depth
04:28

IoT and Industrial Controls
05:09

Application Architecture
05:50

Databases
05:58

Databases in depth
04:45

Database Issues
05:10

Database Issues in depth
09:17

Middleware
08:59

Mining Databases
05:49

Web Applications
07:25

Mobile Code Cookies
06:02

Mobile Code XSS
07:31

Mobile Code Java ActiveX
07:08

Web Applications Browser Email
04:41

Web Applications Input Validation
03:19

OWASP
01:55
+
Cryptography
6 Lectures 28:11
Introduction
05:32

Cryptography in depth
04:20

Cryptographic Algorithms
03:44

Strong Cryptography
04:48

Cryptographic Keys
03:47

Key Management
06:00
+
Hashing Algorithms
5 Lectures 26:51
Introduction
06:16

Hashing
04:27

Hashing Algorithms
06:51

Strong Hashing Algorithms
03:10

Hashing Services
06:07
+
Symmetric Key Algorithms
17 Lectures 01:37:33
Introduction
05:43

Services
08:41

Algorithms
06:48

Cracking Symmetric Key Algorithms
03:08

Vigenere Symmetric Key Algorithm
06:50

Boolean Logic XOR
06:28

Kerckhoffs and Gilbert Vernam
05:15

Hebern, Enigma, Feistel, S and T
05:12

Block Ciphers and Stream Ciphers
05:10

DES and 3DES
06:53

AES, Block Ciphers and Variables
06:54

ECB and CBC
05:46

OFB and CFB
07:38

CTR
03:09

Message Authentication Code
03:17

MAC and HMAC
06:42

Symmetric Summary
03:59
+
Asymmetric Key Algorithms
11 Lectures 01:08:08
Introduction
05:29

Services
06:47

Management
06:10

Key Distribution and Digital Signature
05:52

Digital Signature
05:07


Multiple Recipients
03:19

SSL and TLS
08:04

Diffie Hellman Merkle
07:08

RSA, ELGamal, ECC and DSS
07:01

Asymmetric Key Cryptography
06:19
4 More Sections
About the Instructor
iTech Academy, Inc.
0.0 Average rating
0 Reviews
8 Students
9 Courses
Learn cutting-edge technologies from the world's best expert

iTech Academy is a global technology, consulting and training company. We create high quality courses, videos and tutorials aimed at teaching the world a new skill, or helping people to get better at what they already do.

Utilizing state of the art technologies, highly experienced consultants and innovative methodologies, we provide, cutting-edge education products, services and solutions for individuals, corporate organizations, governmental institutions and education providers.

Our aim is to deliver valuable knowledge, provide you with pretty simple, succinct, comprehensible and qualitative materials at quite acceptable price. We are absolutely open to our students that's why you are welcome to ask any questions which we are really thankful for.