From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Security engineering
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Security engineering
- Hi, I'm Mike Chapple and I'd like to welcome you to our CISSP Security Architecture and Engineering course. The Certified Information Systems Security Professional, or CISSP certification, is the gold standard for information security certification. You'll find that it's a core requirement for many mid and senior level information security positions. Earning the CISSP requires demonstrating that you have sufficient work experience and passing an exam covering the eight domains of information security. This course covers the third of those eight domains, security architecture and engineering. 13% of the questions on the CISSP exam come from this domain. I have two decades of experience as an information security professional and I've been involved in CISSP training and certification for most of those. As we work our way through this course, we will focus on each topic covered by domain three. We'll review how to select security controls that balance business needs and security requirements. We'll also do a deep dive into cryptography, one of the most important data protection tools at the disposal of a security professional. You'll also learn about physical security topics, including site design and monitoring. And that's just a small sampling of the many topics covered in this course. These topics, combined with the information you learn in our other CISSP courses, will help you pass the CISSP exam and also provide a critical foundation for your career in information security. In addition to using this course and the companion books to prepare for the exam, I encourage you to visit my website at certmike.com and sign up for my free CISSP study group. I'll send you weekly emails guiding you through the exam preparation process and offer you test taking tips to get you ready for the exam. All right, let's get rolling.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
What is the cloud?3m 53s
-
Cloud computing roles2m 35s
-
(Locked)
Drivers for cloud computing3m 17s
-
(Locked)
Multitenant computing2m 15s
-
(Locked)
Virtualization4m 48s
-
(Locked)
Desktop and application virtualization2m 38s
-
(Locked)
Cloud compute resources7m 52s
-
(Locked)
Containerization1m 58s
-
(Locked)
Cloud activities and the Cloud Reference Architecture2m 49s
-
(Locked)
Cloud deployment models2m 45s
-
(Locked)
Cloud service categories5m 21s
-
(Locked)
Edge and fog computing1m 46s
-
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
SQL injection prevention4m 25s
-
(Locked)
Cross-site scripting prevention3m 17s
-
(Locked)
Cross-site request forgery prevention4m 8s
-
(Locked)
Defending against directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
-
-
(Locked)
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Codes and ciphers3m 5s
-
(Locked)
Cryptographic math2m 38s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The perfect encryption algorithm3m 21s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
-
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
Digital signature standard1m 40s
-
(Locked)
Create a digital certificate4m 55s
-
(Locked)
Revoke a digital certificate1m 41s
-
(Locked)
Certificate stapling2m 29s
-
(Locked)
Certificate authorities6m 13s
-
(Locked)
Certificate subjects3m 35s
-
(Locked)
Certificate types2m 55s
-
(Locked)
Certificate formats2m 30s
-
(Locked)