Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

CISSP Cert Prep (2021): 3 Security Architecture and Engineering

via LinkedIn Learning

Overview

Prepare for domain three—Security Architecture and Engineering—of the CISSP certification exam. Get study tips for topics such as device security, cryptography, and key management.

Syllabus

Introduction
  • Security engineering
  • What you need to know
  • Study resources
1. Secure Design
  • Secure design principles
  • Security models
  • Security evaluation models
  • Separation of duties
  • Selecting security controls
  • Privacy by design
  • Secure defaults
2. Virtualization and Cloud Computing
  • What is the cloud?
  • Cloud computing roles
  • Drivers for cloud computing
  • Multitenant computing
  • Virtualization
  • Desktop and application virtualization
  • Cloud compute resources
  • Containerization
  • Cloud activities and the Cloud Reference Architecture
  • Cloud deployment models
  • Cloud service categories
  • Edge and fog computing
3. Hardware Security
  • Memory protection
  • Hardware encryption
  • Hardware and firmware security
4. Server Security Issues
  • Server and database security
  • NoSQL databases
  • Distributed and high performance computing
5. Web Security Issues
  • OWASP Top 10
  • SQL injection prevention
  • Cross-site scripting prevention
  • Cross-site request forgery prevention
  • Defending against directory traversal
  • Overflow attacks
  • Session hijacking
  • Privilege escalation
6. Embedded Systems Security
  • Industrial control systems
  • Internet of Things
  • Securing smart devices
  • Secure networking for smart devices
  • Embedded systems
  • Communications for embedded devices
7. Encryption
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Goals of cryptography
  • Codes and ciphers
  • Cryptographic math
  • Choosing encryption algorithms
  • The perfect encryption algorithm
  • The cryptographic lifecycle
8. Symmetric Cryptography
  • Data Encryption Standard
  • 3DES
  • AES, Blowfish, and Twofish
  • RC4
  • Cipher modes
  • Steganography
9. Asymmetric Cryptography
  • Rivest, Shamir, Adelman (RSA)
  • PGP and GnuPG
  • Elliptic-curve and quantum cryptography
10. Key Management
  • Key exchange
  • Diffie-Hellman
  • Key escrow
  • Key stretching
  • Hardware security modules
11. Public Key Infrastructure
  • Trust models
  • PKI and digital certificates
  • Hash functions
  • Digital signatures
  • Digital signature standard
  • Create a digital certificate
  • Revoke a digital certificate
  • Certificate stapling
  • Certificate authorities
  • Certificate subjects
  • Certificate types
  • Certificate formats
12. Cryptanalytic Attacks
  • Brute force attacks
  • Knowledge-based attacks
  • Eavesdropping attacks
  • Implementation attacks
  • Limitations of encryption algorithms
  • Ransomware
13. Physical Security
  • Site and facility design
  • Data center environmental controls
  • Data center environmental protection
  • Power control
  • Physical access control
  • Visitor management
  • Physical security personnel
14. Threat Modeling
  • Threat intelligence
  • Managing threat indicators
  • Intelligence sharing
  • Threat research
  • Identifying threats
  • Automating threat intelligence
  • Threat hunting
15. Software Security Architecture
  • SOAP and REST
  • SOA and microservices
Conclusion
  • Continuing your preparation

Taught by

Mike Chapple

Reviews

Start your review of CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.