Course Modules
This course contains the following modules.
Module 1: Security and Risk Management
- Introduction
- CIA Triad Security Governance – Part 1
- CIA Triad Security Governance – Part 2
- Compliance Legal And Regulatory Issues – Part 1
- Compliance Legal And Regulatory Issues – Part 2
- Understanding Professional Ethics – Part 1
- Understanding Professional Ethics – Part 2
- Risk Management – Part 1
- Risk Management – Part 2
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 1
- Threat Modeling Acquisition Strategy And Practice Security Awareness And Training – Part 2
Module 2: Asset Security
- Asset Security – Part 1
- Asset Security – Part 2
Module 3: Security Engineering
- Engineering And Management Of Security – Part 1
- Engineering And Management Of Security – Part 2
- Engineering And Management Of Security – Part 3
- Engineering And Management Of Security – Part 4
- Engineering And Management Of Security – Part 5
- Engineering And Management Of Security – Part 6
Module 4: Communication and Network Security
- Apply Secure Design Principles To Networks – Part 1
- Apply Secure Design Principles To Networks – Part 2
- Apply Secure Design Principles To Networks – Part 3
- Apply Secure Design Principles To Networks – Part 4
- Apply Secure Design Principles To Networks – Part 5
- Apply Secure Design Principles To Networks – Part 6
- Securing Network Components – Part 1
- Securing Network Components – Part 2
- Design And Establish Secure Communication Channels – Part 1
- Design And Establish Secure Communication Channels – Part 2
- Design And Establish Secure Communication Channels – Part 3
Module 5: Identity and Access Management
- Controlling Access And Managing Identity – Part 1
- Controlling Access And Managing Identity – Part 2
- Controlling Access And Managing Identity – Part 3
- Controlling Access And Managing Identity – Part 4
Module 6: Security Assessment Testing
- Designing Performing And Analyzing Security Testing
Module 7: Security Operations
- Foundational Concepts And Investigations – Part 1
- Foundational Concepts And Investigations – Part 2
- Incident Management And Preventative Measures – Part 1
- Incident Management And Preventative Measures – Part 2
- Disaster Recovery Process – Part 1
- Disaster Recovery Process – Part 2
Module 8: Software Development Security
- Understanding Applying And Enforcing Software Security – Part 1
- Understanding Applying And Enforcing Software Security – Part 2
- Conclusion