CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Go to class
Write Review

Free Online Course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering provided by LinkedIn Learning is a comprehensive online course, which lasts for 6 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CISSP Cert Prep (2021): 3 Security Architecture and Engineering is taught by Mike Chapple.

Overview
  • Prepare for domain three—Security Architecture and Engineering—of the CISSP certification exam. Get study tips for topics such as device security, cryptography, and key management.

Syllabus
  • Introduction

    • Security engineering
    • What you need to know
    • Study resources
    1. Secure Design
    • Secure design principles
    • Security models
    • Security evaluation models
    • Separation of duties
    • Selecting security controls
    • Privacy by design
    • Secure defaults
    2. Virtualization and Cloud Computing
    • What is the cloud?
    • Cloud computing roles
    • Drivers for cloud computing
    • Multitenant computing
    • Virtualization
    • Desktop and application virtualization
    • Cloud compute resources
    • Containerization
    • Cloud activities and the Cloud Reference Architecture
    • Cloud deployment models
    • Cloud service categories
    • Edge and fog computing
    3. Hardware Security
    • Memory protection
    • Hardware encryption
    • Hardware and firmware security
    4. Server Security Issues
    • Server and database security
    • NoSQL databases
    • Distributed and high performance computing
    5. Web Security Issues
    • OWASP Top 10
    • SQL injection prevention
    • Cross-site scripting prevention
    • Cross-site request forgery prevention
    • Defending against directory traversal
    • Overflow attacks
    • Session hijacking
    • Privilege escalation
    6. Embedded Systems Security
    • Industrial control systems
    • Internet of Things
    • Securing smart devices
    • Secure networking for smart devices
    • Embedded systems
    • Communications for embedded devices
    7. Encryption
    • Understanding encryption
    • Symmetric and asymmetric cryptography
    • Goals of cryptography
    • Codes and ciphers
    • Cryptographic math
    • Choosing encryption algorithms
    • The perfect encryption algorithm
    • The cryptographic lifecycle
    8. Symmetric Cryptography
    • Data Encryption Standard
    • 3DES
    • AES, Blowfish, and Twofish
    • RC4
    • Cipher modes
    • Steganography
    9. Asymmetric Cryptography
    • Rivest, Shamir, Adelman (RSA)
    • PGP and GnuPG
    • Elliptic-curve and quantum cryptography
    10. Key Management
    • Key exchange
    • Diffie-Hellman
    • Key escrow
    • Key stretching
    • Hardware security modules
    11. Public Key Infrastructure
    • Trust models
    • PKI and digital certificates
    • Hash functions
    • Digital signatures
    • Digital signature standard
    • Create a digital certificate
    • Revoke a digital certificate
    • Certificate stapling
    • Certificate authorities
    • Certificate subjects
    • Certificate types
    • Certificate formats
    12. Cryptanalytic Attacks
    • Brute force attacks
    • Knowledge-based attacks
    • Eavesdropping attacks
    • Implementation attacks
    • Limitations of encryption algorithms
    • Ransomware
    13. Physical Security
    • Site and facility design
    • Data center environmental controls
    • Data center environmental protection
    • Power control
    • Physical access control
    • Visitor management
    • Physical security personnel
    14. Threat Modeling
    • Threat intelligence
    • Managing threat indicators
    • Intelligence sharing
    • Threat research
    • Identifying threats
    • Automating threat intelligence
    • Threat hunting
    15. Software Security Architecture
    • SOAP and REST
    • SOA and microservices
    Conclusion
    • Continuing your preparation