CISSP Cert Prep: 3 Security Architecture and Engineering

CISSP Cert Prep: 3 Security Architecture and Engineering

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 4h 21m | 512 MB

Certified Information Systems Security Professional (CISSP) is the gold standard in IT security certification. Prepare for domain three of the exam-Security Architecture and Engineering-in this installment of CISSP Cert Prep. Security engineering ensures systems are designed to deal with all sorts of risks and disruptions, from hackers and database meltdowns to electrical outages. In this course, security expert Mike Chapple covers everything you need to know to balance business needs with security risks and design more secure systems. He covers cloud computing, as well as hardware, web, and mobile security; client and server vulnerabilities; smart device security; and physical security, such as site design and monitoring. Plus, get a deep dive into cryptography, one of the most powerful tools that IT pros can use to secure data and accounts.

Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.

Topics include:

  • Understanding security design principles and models
  • Cloud computing and virtualization
  • Hardware security
  • Client and server vulnerabilities
  • Web security vulnerabilities
  • Securing mobile devices and smart devices
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Key management and public key infrastructure
  • Physical security
Table of Contents

Introduction
1 Welcome
2 What you need to know

Security Engineering
3 Secure design principles
4 Security models
5 Security requirements

Asymmetric Cryptography
6 Rivest-Shamir-Adleman (RSA)
7 PGP and GnuPG
8 Elliptic-curve and quantum cryptography

Key Management
9 Key exchange
10 Diffie-Hellman
11 Key escrow
12 Key stretching

Public Key Infrastructure
13 Trust models
14 PKI and digital certificates
15 Hash functions
16 Digital signatures
17 Create a digital certificate
18 Revoke a digital certificate

Cryptanalytic Attacks
19 Brute-force attacks
20 Knowledge-based attacks

Physical Security
21 Site and facility design
22 Data center environmental controls
23 Data center environmental protection
24 Physical security control types
25 Physical access control
26 Visitor management

Conclusion
27 Next steps

Cloud Computing and Virtualization
28 Virtualization
29 Cloud computing models
30 Public cloud tiers

Hardware Security
31 Memory protection
32 Interface protection
33 High availability and fault tolerance

Client and Server Vulnerabilities
34 Client security issues
35 Server security issues
36 NoSQL databases
37 Large-scale parallel and distributed systems

Web Security
38 OWASP top ten
39 SQL Injection prevention
40 Cross-site scripting prevention
41 Cross-site request forgery prevention
42 Fuzz testing
43 Session hijacking

Mobile Security
44 Mobile device security
45 Mobile device management
46 Mobile device tracking
47 Mobile application security
48 Bring your own device (BYOD)

Smart Device Security
49 Industrial control systems
50 Smart home technology
51 Securing the Internet of Things
52 Secure networking for the Internet of Things

Encryption
53 Understanding encryption
54 Symmetric and asymmetric cryptography
55 Goals of cryptography
56 Codes and ciphers
57 Choosing encryption algorithms
58 The perfect encryption algorithm
59 The cryptographic life cycle
60 Digital rights management

Symmetric Cryptography
61 Data Encryption Standard (DES)
62 DES
63 AES, Blowfish, and Twofish
64 RC4
65 Steganography