IT & Software

Security Engineering: The Complete Guide (incl. CISSP&CISA)

What you’ll learn

  • Engineering Process Using Secure Design Principles
  • Fundamental Concepts Of Security Models
  • Controls Based Upon System Security Requirements
  • Security Capabilities Of Information Systems
  • Assess And Mitigate Vulnerabilities
  • Spotlight On Cryptographic Solutions
  • Cryptographic Solutions
  • Understand Methods Of Cryptanalytic Attacks
  • Security Principles For Site And Facility Design
  • Design Site And Facility Security Controls
  • Spotlight On Fire Control
  • Security Architecture & Engineering – Key Points

Requirements

  • Any experience relating to information security would be advantageous, but not essential.

Description

Security Engineering: The Complete Guide (incl. CISSP&CISA)

Welcome. Security engineering handles the integrity and security of real-world systems. The goal of the security architecture and engineering domain is to provide you with concepts, principles, structures and standards, used to design, implement, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity, and availability. There are many similarities to systems engineering, one of which is that their function is to ensure that designs meet the requirements outlined. The main difference is that security engineering is responsible for the consistent enforcement of security policies, processes, procedures or practices. Computer technology has accelerated so rapidly that it has created much more convoluted systems with even more intricate security problems. Secure systems must be capable of withstanding a wide range of attacks, from technical to human-based, fraud and deception. This fact involves aspects of psychology, social science and economics, mathematics, physics and chemistry.

In this course, we’re going to cover a fairly wide variety of topics. We’re going to cover things such as:

  • Engineering Process Using Secure Design Principles
  • Fundamental Concepts Of Security Models
  • Controls Based Upon System Security Requirements
  • Security Capabilities Of Information Systems – Vocab
  • Security Capabilities Of Information Systems – CPU
  • Security Capabilities Of Information Systems – Memory
  • Assess And Mitigate Vulnerabilities – The Basics
  • Assess And Mitigate Vulnerabilities – The Rest
  • Spotlight On Cryptographic Solutions – Symmetric
  • Spotlight On Cryptographic Solutions – Asymmetric
  • Spotlight On Cryptographic Solutions – PKI & Certs
  • Spotlight On Cryptographic Solutions – Hashing
  • Cryptographic Solutions – Digital Signing
  • Understand Methods Of Cryptanalytic Attacks
  • Security Principles For Site And Facility Design
  • Design Site And Facility Security Controls
  • Spotlight On Fire Control

Security engineering is going to become much more complex at the technological level before it gets any easier. This is partly a result of the ever-increasing and continuous stream of technology that continues to arrive. At the same time, as there is an increase in researchers, there is also an increase in attackers looking for vulnerable systems. As security improves, so do attackers. They adapt to emerging or new technologies.

Who this course is for:

  • Anyone who wants to learn cyber security

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

AdBlocks

Turn off the ad blocker