This in-depth course on Security Architecture and Engineering aligns with the latest CISSP curriculum and is designed to enhance your expertise in building and securing IT environments. You'll start by exploring secure design principles and key security models like Bell-LaPadula, Biba, and Clark-Wilson, giving you a strong foundation in designing secure systems. From there, you’ll delve into security control implementation, memory protection, and encryption techniques, ensuring you understand how to protect both data in motion and at rest.
The course also covers system-specific vulnerabilities, including those found in client-server, database, cloud, and IoT systems. You'll learn how to assess and mitigate risks associated with virtualization, containerization, and distributed microservices, as well as how to secure industrial control systems and high-performance computing environments. Through real-world examples, you'll develop practical skills to protect systems from both internal and external threats.
Finally, the course explores cryptography fundamentals, Public Key Infrastructure (PKI), digital signatures, and classic cryptanalytic attacks. Physical security principles are also discussed, including site design, natural access controls, and the implementation of security measures for facilities. By the end, you’ll be equipped to implement comprehensive security architectures that protect both digital assets and physical sites, while also being fully prepared for the CISSP exam.
This course is ideal for IT professionals, security architects, and system engineers preparing for the CISSP certification or seeking to enhance their knowledge of security architecture and engineering. A basic understanding of information security is recommended.
Overview
Syllabus
- Security Design Principles and Models
- This module introduces the foundational security design principles and models used to secure information systems. Learners will explore secure design principles, various security models such as Bell-LaPadula, Biba, and Clark-Wilson, and how these models shape system security. The module also focuses on the application of memory protections, trusted platform modules (TPMs), and selecting the right security controls to build robust systems.
- Vulnerabilities and Cryptographic Security
- This module dives into the vulnerabilities that impact various systems including client, server, database, cloud, and IoT. It also provides an in-depth exploration of cryptographic systems, including encryption basics, Public Key Infrastructure (PKI), digital signatures, and cryptographic attacks. Learners will gain a comprehensive understanding of how to safeguard different environments from security vulnerabilities and cryptographic threats.
Taught by
Packt - Course Instructors