Security Architecture and Design: The Big Picture
Company security breaches are a daily news occurrence, and they affect companies of all sizes in every industry. This course will give you the essential foundation to design and architect a secure solution to protect a company’s data and assets.
What you'll learn
Every day we hear of another company that's been hacked many with millions of user records stolen, leaked to the dark web, or sold to the highest bidder. Understanding what makes an effective security posture is essential to combating this ever-changing threat.
In this course, Security Architecture and Design: The Big Picture, you'll learn the essential foundations of what makes an effective information security program along with what infrastructure and applications are required. First, you'll learn about installing and configuring network components, then you'll learn about secure protocols. Next, you'll explore implementing secure network architecture and troubleshooting common security issues. Finally, you'll discover secure systems design, application development and deployment, and physical security controls.
When you're finished this course, you'll have a good understanding of the various pieces that make up a solid security posture. Not only will you understand all major components of information security, but also how they fit together, and how to architect them according to best practices, to protect a company's data and digital assets.
Table of contents
- Module Intro 4m
- TCP/IP and OSI Models 2m
- Firewalls 6m
- Web Application Firewalls 2m
- Virtual Private Networks (VPN) 4m
- Transport Encryption 2m
- NIDS and NIPS 6m
- IDS/IPS Workflow 1m
- Four Approaches to IDS 2m
- Network Based IDS 2m
- Reacting to Alerts or Issues 3m
- Routers and Common Routing Protocols 3m
- Switches 2m
- Layer 2 vs. Layer 3 1m
- Load Balancers 1m
- Load Balancer Types 3m
- Web Security Gateways 2m
- Port Security and 802.1x 4m
- Loop Protection and Flood Guards 2m
- Spanning Tree Protocol (STP) 3m
- Access Points and WiFi Security 4m
- Security Information and Event Management (SIEM) 3m
- Data Loss Prevention (DLP) 2m
- Network Access Control (NAC) 3m
- Hardware Based Encryption 2m
- Mail Gateway 1m
- Additional Things to Consider 2m
- Module Intro 3m
- Unencrypted Credentials 2m
- Logs and Event Anomalies 2m
- Access Violations 2m
- Certificate Issues and Hierarchy 3m
- Misconfigured Devices 1m
- Weak Security Configuration 1m
- Personnel Issues 5m
- Unauthorized Software 2m
- Baseline Deviation and License Compliance 6m
- Asset Management 1m
- Authentication Issues 2m
- Module intro and Secure Boot 3m
- Measured Launch 1m
- Integrity Measurement Architecture (IMA) 1m
- BIOS/UEFI 1m
- Data Encryption / Hardware Based Encryption 8m
- Types of Data to Secure 1m
- Supply Chain Security 2m
- Hardware Root of Trust 1m
- EMI/EMP 1m
- Trusted OS 3m
- Secure Systems Design 3m
- Mobile Device Management 7m
- Peripherals Security 3m
- Module Intro 2m
- Development Life-cycle Models 1m
- Waterfall Development Model 2m
- Secure DevOps 1m
- Security Automation 3m
- Continuous Integration 2m
- Baselining and CI/CD 1m
- Immutable Systems 1m
- Infrastructure as Code 1m
- General Change Management 2m
- Provisioning, Deprovisioning and Asset Disposal 2m
- SDLC 2m
- Secure Coding Techniques 6m
- Code Quality and Testing 3m
- Static Code Analysis 2m
- Fuzzing 4m
- Secure Coding Concepts 2m
- Compiled vs. Runtime Code 2m
- Module Intro 2m
- Proper Lighting and Signage 2m
- Fencing 2m
- Guards 1m
- Alarms 2m
- Securing Physical Asssets 1m
- Protected Distribution Systems (PDS) 4m
- Airgap Networks 2m
- Hardware Locks 1m
- Mantraps 1m
- EMI Shielding 3m
- Proximity Readers 1m
- Biometrics 1m
- Barricades 1m
- HVAC 2m
- Hot and Cold Aisles 3m
- Fire Suppression 3m
- Screen Filters 1m
- Cameras and Video Surveillance 2m
- Motion Detection and Infrared 1m
- Logs 1m
- Key Management 2m
Course FAQ
In this course, you will learn how to install and configure network components, how to implement secure protocols, secure a network architecture, how to troubleshoot common security issues, and physical security controls.
Prerequisites for this course include: general computing knowledge and and understanding of networking fundamentals.
Secure protocols are sequences of operations that ensure protection of data.
This course is for anyone who wants to learn more about cybersecurity and security architecture.
A firewall is a network security device that monitors incoming and outgoing network traffic and will permit or block data packets based on a set of security rules.