CISSP Cert Prep (2021): 3 Security Architecture and Engineering

  • 6 hours worth of material
  • LinkedIn Learning
  • English
CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Course Overview

Prepare for domain three—Security Architecture and Engineering—of the CISSP certification exam. Get study tips for topics such as device security, cryptography, and key management.

Course Circullum

Introduction
  • Security engineering
  • What you need to know
  • Study resources
1. Secure Design
  • Secure design principles
  • Security models
  • Security evaluation models
  • Separation of duties
  • Selecting security controls
  • Privacy by design
  • Secure defaults
2. Virtualization and Cloud Computing
  • What is the cloud?
  • Cloud computing roles
  • Drivers for cloud computing
  • Multitenant computing
  • Virtualization
  • Desktop and application virtualization
  • Cloud compute resources
  • Containerization
  • Cloud activities and the Cloud Reference Architecture
  • Cloud deployment models
  • Cloud service categories
  • Edge and fog computing
3. Hardware Security
  • Memory protection
  • Hardware encryption
  • Hardware and firmware security
4. Server Security Issues
  • Server and database security
  • NoSQL databases
  • Distributed and high performance computing
5. Web Security Issues
  • OWASP Top 10
  • SQL injection prevention
  • Cross-site scripting prevention
  • Cross-site request forgery prevention
  • Defending against directory traversal
  • Overflow attacks
  • Session hijacking
  • Privilege escalation
6. Embedded Systems Security
  • Industrial control systems
  • Internet of Things
  • Securing smart devices
  • Secure networking for smart devices
  • Embedded systems
  • Communications for embedded devices
7. Encryption
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Goals of cryptography
  • Codes and ciphers
  • Cryptographic math
  • Choosing encryption algorithms
  • The perfect encryption algorithm
  • The cryptographic lifecycle
8. Symmetric Cryptography
  • Data Encryption Standard
  • 3DES
  • AES, Blowfish, and Twofish
  • RC4
  • Cipher modes
  • Steganography
9. Asymmetric Cryptography
  • Rivest, Shamir, Adelman (RSA)
  • PGP and GnuPG
  • Elliptic-curve and quantum cryptography
10. Key Management
  • Key exchange
  • Diffie-Hellman
  • Key escrow
  • Key stretching
  • Hardware security modules
11. Public Key Infrastructure
  • Trust models
  • PKI and digital certificates
  • Hash functions
  • Digital signatures
  • Digital signature standard
  • Create a digital certificate
  • Revoke a digital certificate
  • Certificate stapling
  • Certificate authorities
  • Certificate subjects
  • Certificate types
  • Certificate formats
12. Cryptanalytic Attacks
  • Brute force attacks
  • Knowledge-based attacks
  • Eavesdropping attacks
  • Implementation attacks
  • Limitations of encryption algorithms
  • Ransomware
13. Physical Security
  • Site and facility design
  • Data center environmental controls
  • Data center environmental protection
  • Power control
  • Physical access control
  • Visitor management
  • Physical security personnel
14. Threat Modeling
  • Threat intelligence
  • Managing threat indicators
  • Intelligence sharing
  • Threat research
  • Identifying threats
  • Automating threat intelligence
  • Threat hunting
15. Software Security Architecture
  • SOAP and REST
  • SOA and microservices
Conclusion
  • Continuing your preparation
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • Security engineering
  • What you need to know
  • Study resources
1. Secure Design
  • Secure design principles
  • Security models
  • Security evaluation models
  • Separation of duties
  • Selecting security controls
  • Privacy by design
  • Secure defaults
2. Virtualization and Cloud Computing
  • What is the cloud?
  • Cloud computing roles
  • Drivers for cloud computing
  • Multitenant computing
  • Virtualization
  • Desktop and application virtualization
  • Cloud compute resources
  • Containerization
  • Cloud activities and the Cloud Reference Architecture
  • Cloud deployment models
  • Cloud service categories
  • Edge and fog computing
3. Hardware Security
  • Memory protection
  • Hardware encryption
  • Hardware and firmware security
4. Server Security Issues
  • Server and database security
  • NoSQL databases
  • Distributed and high performance computing
5. Web Security Issues
  • OWASP Top 10
  • SQL injection prevention
  • Cross-site scripting prevention
  • Cross-site request forgery prevention
  • Defending against directory traversal
  • Overflow attacks
  • Session hijacking
  • Privilege escalation
6. Embedded Systems Security
  • Industrial control systems
  • Internet of Things
  • Securing smart devices
  • Secure networking for smart devices
  • Embedded systems
  • Communications for embedded devices
7. Encryption
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Goals of cryptography
  • Codes and ciphers
  • Cryptographic math
  • Choosing encryption algorithms
  • The perfect encryption algorithm
  • The cryptographic lifecycle
8. Symmetric Cryptography
  • Data Encryption Standard
  • 3DES
  • AES, Blowfish, and Twofish
  • RC4
  • Cipher modes
  • Steganography
9. Asymmetric Cryptography
  • Rivest, Shamir, Adelman (RSA)
  • PGP and GnuPG
  • Elliptic-curve and quantum cryptography
10. Key Management
  • Key exchange
  • Diffie-Hellman
  • Key escrow
  • Key stretching
  • Hardware security modules
11. Public Key Infrastructure
  • Trust models
  • PKI and digital certificates
  • Hash functions
  • Digital signatures
  • Digital signature standard
  • Create a digital certificate
  • Revoke a digital certificate
  • Certificate stapling
  • Certificate authorities
  • Certificate subjects
  • Certificate types
  • Certificate formats
12. Cryptanalytic Attacks
  • Brute force attacks
  • Knowledge-based attacks
  • Eavesdropping attacks
  • Implementation attacks
  • Limitations of encryption algorithms
  • Ransomware
13. Physical Security
  • Site and facility design
  • Data center environmental controls
  • Data center environmental protection
  • Power control
  • Physical access control
  • Visitor management
  • Physical security personnel
14. Threat Modeling
  • Threat intelligence
  • Managing threat indicators
  • Intelligence sharing
  • Threat research
  • Identifying threats
  • Automating threat intelligence
  • Threat hunting
15. Software Security Architecture
  • SOAP and REST
  • SOA and microservices
Conclusion
  • Continuing your preparation
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:6 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today