This course is designed for Cybersecurity and Application Security Specialists, IT Security Managers and System Administrators, Software Developers, as well as IT Consultants and Penetration Testers. The course will go deeper into the design process, focusing on how to create secure information system architectures. It will cover threat modeling, secure-by-design principles, and integrating security into Software Development Life Cycles (SDLC) for software developers and computer networks. It will also provide IT Managers with strategies to align security design with business needs. By the end of the course, learners should be able to design secure information system architectures that can withstand various threat scenarios.

Entdecken Sie neue Fähigkeiten mit $120 Rabatt auf Kurse von Branchenexperten. Jetzt sparen.


Designing Robust Information System Security Architectures
Dieser Kurs ist Teil von Spezialisierung fĂźr Designing Information System Security Architectures

Dozent: Vahab Iranmanesh
Bei enthalten
Empfohlene Erfahrung
Kompetenzen, die Sie erwerben
- Kategorie: IT Security Architecture
- Kategorie: Compliance Management
- Kategorie: Solution Architecture
- Kategorie: Application Security
- Kategorie: Security Requirements Analysis
- Kategorie: Security Testing
- Kategorie: Penetration Testing
- Kategorie: Secure Coding
- Kategorie: Systems Architecture
- Kategorie: Security Strategy
- Kategorie: Threat Modeling
- Kategorie: Software Development Methodologies
- Kategorie: Software Development Life Cycle
- Kategorie: Business Risk Management
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufĂźgen
12 Aufgaben
Erfahren Sie, wie Mitarbeiter fĂźhrender Unternehmen gefragte Kompetenzen erwerben.

Erweitern Sie Ihre Fachkenntnisse
- Lernen Sie neue Konzepte von Branchenexperten
- Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
- Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
- Erwerben Sie ein Berufszertifikat zur Vorlage

In diesem Kurs gibt es 3 Module
This module provides an in-depth exploration of Secure-by-Design, a security approach that differs from traditional security methods and also identifies the principles of Secure-by-Design. Next, the module compares the essential steps required to design a secure information system from the ground up, highlighting the unique considerations and practices associated with Secure-by-Design. Finally, the module delves into various security testing methods used to assess and validate the security of software designs. This includes techniques such as threat modeling, penetration testing, vulnerability scanning, and code review. By the end of this module, learners will have a comprehensive understanding of Secure-by-Design and the principles, practices, and testing methods associated with this security approach.
Das ist alles enthalten
12 Videos4 LektĂźren4 Aufgaben1 Diskussionsthema1 Plug-in
This module covers the topic of developing a business-centric security strategy that balances security investments with financial constraints, ensures compliance with regulations, and aligns with the organization's overarching business goals and objectives. Additionally, the module emphasizes the importance of considering operational and user experience and usability while implementing security controls. The module lists key steps involved in developing a business-centric security strategy from assessment to reviewing. By the end of this module, learners will have a comprehensive understanding of developing a security strategy that aligns with their organization's business goals while ensuring compliance and maintaining security.
Das ist alles enthalten
5 Videos2 LektĂźren4 Aufgaben1 Diskussionsthema1 Plug-in
This module covers software security and its importance in ensuring the resilience of software systems. It identifies the potential consequences of inadequate security measures, explores security considerations across various development methodologies such as Waterfall, Agile, DevOps, and explains the steps which can be used in Software Development Life Cycle (SDLC). The module also discusses common challenges faced while incorporating security into the SDLC. By the end of this module, learners will have a comprehensive understanding of integrating security into software and be equipped with the knowledge and skills to develop a proactive security approach.
Das ist alles enthalten
5 Videos3 LektĂźren4 Aufgaben1 Diskussionsthema1 Plug-in
Erwerben Sie ein Karrierezertifikat.
FĂźgen Sie dieses Zeugnis Ihrem LinkedIn-Profil, Lebenslauf oder CV hinzu. Teilen Sie sie in Social Media und in Ihrer Leistungsbeurteilung.
Dozent

von
Mehr von Security entdecken
- Status: Kostenloser Testzeitraum
- Status: Kostenloser Testzeitraum
- Status: Kostenloser Testzeitraum
- Status: Kostenloser Testzeitraum
Warum entscheiden sich Menschen fĂźr Coursera fĂźr ihre Karriere?





Neue KarrieremĂśglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten â 100 % online
SchlieĂen Sie sich mehr als 3.400Â Unternehmen in aller Welt an, die sich fĂźr Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we donât give refunds, but you can cancel your subscription at any time. See our full refund policy.
Weitere Fragen
Finanzielle UnterstĂźtzung verfĂźgbar,