HOME > IT & Software > CISSP Domain 3 Security Engineering

CISSP Domain 3 Security Engineering

SynopsisCISSP – Domain 3 – Security Engineering, availabl...
CISSP Domain 3 Security Engineering  No.1

CISSP – Domain 3 – Security Engineering, available at $19.99, with 66 lectures, 1 quizzes, and has 3 subscribers.

You will learn about Understanding Information Security Concepts in Domain 3 – Security Engineering Using Security Design Principles in The Engineering Lifecycle Understanding Fundamental Concepts of Security Models Exploring Information Systems Security Evaluation Models Ensuring Security Capabilities of Information Systems Discovering Vulnerabilities of Security Architectures Securing Databases Analyzing Vulnerabilities and Threats Applying and Using Cryptography Site Planning Site Planning? Implementing and Operating Facilities Security This course is ideal for individuals who are Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate It is particularly useful for Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate.

Enroll now: CISSP – Domain 3 – Security Engineering

Summary

Title: CISSP – Domain 3 – Security Engineering

Price: $19.99

Number of Lectures: 66

Number of Quizzes: 1

Number of Published Lectures: 66

Number of Published Quizzes: 1

Number of Curriculum Items: 67

Number of Published Curriculum Objects: 67

Original Price: $34.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understanding Information Security Concepts in Domain 3 – Security Engineering
  • Using Security Design Principles in The Engineering Lifecycle
  • Understanding Fundamental Concepts of Security Models
  • Exploring Information Systems Security Evaluation Models
  • Ensuring Security Capabilities of Information Systems
  • Discovering Vulnerabilities of Security Architectures
  • Securing Databases
  • Analyzing Vulnerabilities and Threats
  • Applying and Using Cryptography
  • Site Planning
  • Site Planning? Implementing and Operating Facilities Security
  • Who Should Attend

  • Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate
  • Target Audiences

  • Network, IT, Server Managers and Security Administrators who want to earn a CISSP Certificate
  • CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 3 – Security Engineering. Engineering is about understanding and designing systems that work. Security is a fundamental part of any well designed system. This domain will help you understand the engineering lifecycle and various models and security components required in data structures and physical facilities. We also learn how cryptography fits in to information security.

    With nearly 10,000 training videos available for desktop applications, technical concepts, and business skills that comprise hundreds of courses, Intellezy has many of the videos and courses you and your workforce needs to stay relevant and take your skills to the next level. Our video content is engaging and offers assessments that can be used to test knowledge levels pre and/or post course. Our training content is also frequently refreshed to keep current with changes in the software. This ensures you and your employees get the most up-to-date information and techniques for success. And, because our video development is in-house, we can adapt quickly and create custom content for a more exclusive approach to software and computer system roll-outs.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Chapter 2: Using Security Design Principles in The Engineering Lifecycle

    Lecture 1: Systems Engineering

    Chapter 3: Understanding Fundamental Concepts of Security Models

    Lecture 1: Common System Components

    Lecture 2: Enterprise Security Architecture

    Lecture 3: Common Architecture Frameworks

    Lecture 4: Introducing Types of Security Models

    Lecture 5: The Bell-LaPadula Confidentiality Model

    Lecture 6: The Biba Integrity Model

    Lecture 7: The Clark-Wilson Integrity Model

    Lecture 8: Other Types of Security Models

    Lecture 9: Capturing and Analyzing Requirements

    Lecture 10: Creating and Documenting Security Architecture

    Chapter 4: Exploring Information Systems Security Evaluation Models

    Lecture 1: Common Formal Security Models

    Lecture 2: Trusted Computer System Evaluation Criteria

    Lecture 3: Information Technology Security Evaluation Criteria

    Lecture 4: The Common Criteria

    Lecture 5: Industry and International Security Implementation Guidelines

    Chapter 5: Ensuring Security Capabilities of Information Systems

    Lecture 1: Access Control Mechanisms

    Lecture 2: Secure Memory Management

    Chapter 6: Discovering Vulnerabilities of Security Architectures

    Lecture 1: Systems

    Lecture 2: Technology and Process Integration

    Lecture 3: Single Point of Failure (SPOF)

    Lecture 4: Client-Based Vulnerabilities

    Lecture 5: Server-Based Vulnerabilities

    Chapter 7: Database Security

    Lecture 1: Database Security

    Lecture 2: Large Scale Parallel Data Systems

    Lecture 3: Distributed Systems

    Lecture 4: Rapid Elasticity

    Lecture 5: Cryptographic Systems

    Lecture 6: Stream-Based Ciphers

    Lecture 7: Block Ciphers

    Lecture 8: Defining Symmetric Cryptography

    Lecture 9: Counter Mode Algorithms

    Lecture 10: Defining Asymmetric Cryptography

    Lecture 11: Asymmetric Cryptography

    Lecture 12: Hashing and Hybrid Cryptography

    Chapter 8: Analyzing Vulnerabilities and Threats

    Lecture 1: Web Based

    Lecture 2: Risks from Remote Computing

    Lecture 3: Risks from Mobile Workers

    Lecture 4: Embedded Cyber Physical Systems (CPS)

    Chapter 9: The Application and Use of Cryptography

    Lecture 1: The History of Cryptography

    Lecture 2: Emerging Technology

    Lecture 3: Core Information Security Principles

    Lecture 4: Additional Features of Cryptographic Systems

    Lecture 5: The Cryptographic Lifecycle

    Lecture 6: Public Key Infrastructure (PKI)

    Lecture 7: Key Management Process

    Lecture 8: Creation and Distribution of Keys

    Lecture 9: Digital Signatures

    Lecture 10: Digital Rights Management (DRM)

    Lecture 11: Non-Repudiation

    Lecture 12: Hashing

    Lecture 13: Hash Functions

    Lecture 14: Methods of Cryptanalytic Attacks

    Chapter 10: Site Planning

    Lecture 1: Roadway Design

    Lecture 2: Crime Prevention through Environmental Design

    Lecture 3: Windows

    Lecture 4: Garages

    Lecture 5: Location Threats

    Chapter 11: Implementing and Operating Facilities Security

    Lecture 1: Federal Emergency Management Agency (FEMA) Publications

    Lecture 2: Communications and Server Rooms

    Lecture 3: Restricted and Work Area Security

    Lecture 4: Data Center Security

    Chapter 12: Conclusion

    Lecture 1: Course Recap

    Chapter 13: CISSP – Domain 3 – Security Engineering Assessment

    Chapter 14: BONUS LECTURES: Cyber Security for the End User Course

    Lecture 1: Understanding Cyber Threats

    Lecture 2: Using Email and Internet Wisely

    Instructors

  • CISSP Domain 3 Security Engineering  No.2
    Intellezy Trainers
    Multi-Award-Winning eLearning Specialists
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 0 votes
  • 4 stars: 0 votes
  • 5 stars: 0 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!