Wenn Sie sich für diesen Kurs anmelden, werden Sie auch für diese Spezialisierung angemeldet.
Lernen Sie neue Konzepte von Branchenexperten
Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
Erwerben Sie ein Berufszertifikat zur Vorlage
In diesem Kurs gibt es 3 Module
This course is designed for Cybersecurity and Application Security Specialists, IT Security Managers and System Administrators, Software Developers, as well as IT Consultants and Penetration Testers. The course will go deeper into the design process, focusing on how to create secure information system architectures. It will cover threat modeling, secure-by-design principles, and integrating security into Software Development Life Cycles (SDLC) for software developers and computer networks. It will also provide IT Managers with strategies to align security design with business needs. By the end of the course, learners should be able to design secure information system architectures that can withstand various threat scenarios.
This module provides an in-depth exploration of Secure-by-Design, a security approach that differs from traditional security methods and also identifies the principles of Secure-by-Design. Next, the module compares the essential steps required to design a secure information system from the ground up, highlighting the unique considerations and practices associated with Secure-by-Design. Finally, the module delves into various security testing methods used to assess and validate the security of software designs. This includes techniques such as threat modeling, penetration testing, vulnerability scanning, and code review. By the end of this module, learners will have a comprehensive understanding of Secure-by-Design and the principles, practices, and testing methods associated with this security approach.
Secure-by-Design: Concepts and Importance•5 Minuten
Secure-by-Design: DevSecOps Integration•3 Minuten
Secure-by-Design Principles•4 Minuten
Defense in Depth•5 Minuten
Risk-Based and User-Centered Principles•4 Minuten
Access Control•4 Minuten
Designing a Secure Information System•6 Minuten
Data Protection and Secure Communication•6 Minuten
Security Development Practices•5 Minuten
Incident Response and Disaster Recovery•6 Minuten
Testing Approaches for Security in Design•11 Minuten
4 Lektüren•Insgesamt 40 Minuten
Course Syllabus•10 Minuten
Use Case Story: The Breach Before the Blueprint•10 Minuten
Building Your Security Strategy (Case Study)•10 Minuten
Use Case Story as Exam Review: Foundations of Fortification•10 Minuten
4 Aufgaben•Insgesamt 65 Minuten
Lesson 1 Quiz: Concept and Importance of Secure-by-Design•15 Minuten
Lesson 2 Quiz: Designing a Secure Information Systems•15 Minuten
Exam Practice: Designing Secure-by-Design Information System Architectures•5 Minuten
Module 1 Exam: Designing Secure-by-Design Information System Architectures•30 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
Applying Secure-by-Design Principles•10 Minuten
1 Plug-in•Insgesamt 15 Minuten
Advantages of Security-by-Design•15 Minuten
Module 2: Aligning Security Design with Business Needs
Modul 2•2 Stunden abzuschließen
Moduldetails
This module covers the topic of developing a business-centric security strategy that balances security investments with financial constraints, ensures compliance with regulations, and aligns with the organization's overarching business goals and objectives. Additionally, the module emphasizes the importance of considering operational and user experience and usability while implementing security controls. The module lists key steps involved in developing a business-centric security strategy from assessment to reviewing. By the end of this module, learners will have a comprehensive understanding of developing a security strategy that aligns with their organization's business goals while ensuring compliance and maintaining security.
Exam Practice: Aligning Security Design with Business Needs•5 Minuten
Module 2 Exam: Aligning Security Design with Business Needs•30 Minuten
1 Diskussionsthema
Balancing Security and Business Objectives•0 Minuten
1 Plug-in•Insgesamt 15 Minuten
Incorporating Business Needs in Security Strategies•15 Minuten
Module 3: Integrating Security into Software Development Life Cycles
Modul 3•2 Stunden abzuschließen
Moduldetails
This module covers software security and its importance in ensuring the resilience of software systems. It identifies the potential consequences of inadequate security measures, explores security considerations across various development methodologies such as Waterfall, Agile, DevOps, and explains the steps which can be used in Software Development Life Cycle (SDLC). The module also discusses common challenges faced while incorporating security into the SDLC. By the end of this module, learners will have a comprehensive understanding of integrating security into software and be equipped with the knowledge and skills to develop a proactive security approach.
LearnQuest is the preferred training partner to the world’s leading companies, organizations, and government agencies. Our team boasts 20+ years of experience designing, developing and delivering a full suite industry-leading technology education classes and training solutions across the globe. Our trainers, equipped with expert industry experience and an unparalleled commitment to quality, facilitate classes that are offered in various delivery formats so our clients can obtain the training they need when and where they need it.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.