Certified Security Principles+
3.9 (6 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31 students enrolled

Certified Security Principles+

CSP+
3.9 (6 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
31 students enrolled
Last updated 4/2019
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 19 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • The students will be able to advise management on appropriate security policies and practices for their organization.
Requirements
  • There is no required prerequisite for this course however, the candidates are expected to have a basic knowledge of computing principles and the risks involved in use of the internet in modern times.
Description

This course will introduce students to IT security, as well as teach them about risk management, understanding of cryptography, understanding identity and access management, managing data security, managing network security, managing server/host security, application security for non-developers, understanding mobile device security (IoT), managing day to day security, and understanding compliance and auditing.

This course begins with an introduction to IT security, and proceeds to a discussion of risk management in terms of risks and vulnerabilities, cryptography in terms of encryption algorithms and usage, identity and access management including authorization and monitoring, managing data security, managing network security, managing server/host security and application security for non-developers. Mobile device security is covered with reference to the Internet of Things (IoT). The course concludes with a discussion of managing day to day security and understanding compliance and auditing.

Who this course is for:
  • IT professionals looking to move into security management.
  • Managers of IT professionals with a need to understand the security implications of IT decisions.
  • Power users of computers with a need to know and understand the risks involved in surfing the web and managing a computer-based business.
Course content
Expand all 72 lectures 18:56:56
+ Chapter 01 - Introduction to IT Security
7 lectures 01:56:34
Understanding Security
26:14
Responsibilities
22:34
Building a Security Program
27:51
CIA Triad
10:13
Governance, Risk, Compliance
17:51
State of Security Today
10:57
+ Chapter 02 - Risk Management
10 lectures 02:43:55
Risk Management Introduction
01:07
Risk Management
19:05
Risk Assessment
16:16
Types of Risk, Threats and Vulnerabilities
29:29
Mitigating Attacks
24:41
Discovering Vulnerabilities and Threats Part1
17:35
Discovering Vulnerabilities and Threats Part2
14:25
Discovering Vulnerabilities and Threats Part3
17:55
Discovering Vulnerabilities and Threats Part4
13:23
Responding to Risk
09:59
+ Chapter 03 - Understanding of Cryptography
7 lectures 01:34:52
Understanding of Cryptography
01:45
Understanding Cryptography
08:35
Symmetric Encryption
28:54
Asymmetric Encryption
17:36
Hashing
13:32
PKI
10:30
Cryptography in Use
14:00
+ Chapter 04 - Understanding Identity and Access Management
5 lectures 01:12:04
Understanding Identity and Access Management
00:20
Identity Management
14:27
Authentication Techniques
17:27
Single Sign-on
28:22
Access Control Monitoring
11:28
+ Chapter 05 - Managing Data Security
4 lectures 01:16:58
Managing Data Security
00:50
Different Types of Storage
33:34
Encryption Options
13:10
Data Management
29:24
+ Chapter 06 - Managing Network Security
6 lectures 02:12:38
Managing Network Security
01:38
Protocols and Services
28:29
Network and Security Devices Part1
20:31
Network and Security Devices Part2
22:17
Network Design
27:14
Wireless Networking
32:29
+ Chapter 07 - Managing Server/Host Security
7 lectures 01:55:54
Managing Server/Host Security
01:23
Section 1 - The Operating Systems Part1
20:31
The Operating Systems Part2
14:18
The Operating Systems Part3
15:20
The Operating Systems Part4
09:57
Section 2 - Hardening the OS
25:48
Section 3 - Physical Security
28:37
+ Chapter 08 - Application Security for Non-Developers
6 lectures 01:22:05
Application Security for Non-Developers
02:34
Application Security Principles
32:10
Software Development Life Cycle
18:47
OWASP Top 10
16:46
Hardening Web Applications
08:07
Patch/Update/Configuration Management
03:41
+ Chapter 09 - Understanding Mobile Device Security (IoT)
5 lectures 01:03:58
Understanding Mobile Device Security (IoT)
01:28
What devices are we talking about?
08:25
What is the risk?
18:43
Hardening Mobile/IoT Devices
23:59
Corporate Management
11:23