In this course, students will expand their knowledge of information security to apply more advanced principles. Students will apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; support IT governance and risk management; architect security for hosts, networks, and software; respond to security incidents; and more.
Objectives:
- Manage risk in the enterprise
- Integrate computing, communications, and business disciplines in the enterprise.
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques
- Implement security controls for hosts
- Implement security controls for storage
- Analyze network security concepts, components, and architectures, and implement controls.
- Implement security controls for applications.
- Integrate hosts, storage, networks, and applications in a secure enterprise architecture.
- Conduct vulnerability assessments
- Conduct incident and emergency responses
Course Outline
Below is the course content, which includes a detailed outline of topics and materials covered in the course. Explore and enhance your knowledge!
1. Managing Risk
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
2. Integrating Computing, Communications, and Business Disciplines
- Facilitate Collaboration Across Business Units
- Secure Communications and Collaboration Solutions
- Implement Security Activities Throughout the Technology Life Cycle
3. Using Research and Analysis to Secure the Enterprise
- Determine Industry Trends and Effects on the Enterprise
- Analyze Scenarios to Secure the Enterprise
4. Integrating Advanced Authentication and Authorization Techniques
- Implement Authentication and Authorization Technologies
- Implement Advanced Identity Management
5. Implementing Cryptographic Techniques
- Describe Cryptographic Concepts
- Choose Cryptographic Techniques
- Choose Cryptographic Implementations
6. Implementing Security Controls for Hosts
- Select Host Hardware and Software
- Harden Hosts
- Virtualize Servers and Desktops
- Implement Cloud Augmented Security Services
- Protect Boot Loaders
7. Implementing Security Controls for Enterprise Storage
- Identify Storage Types and Protocols
- Implement Secure Storage Controls
8. Analyzing and Implementing Network Security
- Analyze Network Security Components and Devices
- Analyze Network-Enabled Devices
- Analyze Advanced Network Design
- Configure Controls for Network Security
9. Implementing Security Controls for Applications
- Identify General Application Vulnerabilities
- Identify Web Application Vulnerabilities
- Implement Application Security Controls
10. Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
- Implement Security Standards in the Enterprise
- Select Technical Deployment Models
- Secure the Design of the Enterprise Infrastructure
- Secure Enterprise Application Integration Enablers
11. Conducting Vulnerability Assessments
- Select Vulnerability Assessment Methods
- Select Vulnerability Assessment Tools
12. Responding to and Recovering from Incidents
- Design Systems to Facilitate Incident Response
- Conduct Incident and Emergency Responses
Pre-Requisite:
- Attendance in our Internetworking with TCP/IP and Switching in IP Networks courses is strongly recommended Security+ Prep Course
Methodology:
- Batch-wise training
- Practical hands-on training with real-time examples