This in-depth course on Security Architecture and Engineering aligns with the latest CISSP curriculum and is designed to enhance your expertise in building and securing IT environments. You'll start by exploring secure design principles and key security models like Bell-LaPadula, Biba, and Clark-Wilson, giving you a strong foundation in designing secure systems. From there, you’ll delve into security control implementation, memory protection, and encryption techniques, ensuring you understand how to protect both data in motion and at rest.
Security Architecture and Engineering
This course is part of CISSP Certified Information Systems Security Professional Specialization
Instructor: Packt - Course Instructors
Sponsored by ITC-Infotech
Recommended experience
What you'll learn
Understand and implement common security models, including Bell-LaPadula and Biba, in system design.
Identify vulnerabilities in client-server, cloud, and IoT systems, and develop strategies to mitigate them.
Utilize cryptography and PKI to secure sensitive data and communications.
Design and implement physical security controls to safeguard facilities and infrastructure.
Skills you'll gain
Details to know
Add to your LinkedIn profile
1 assignment
October 2024
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 2 modules in this course
This module introduces the foundational security design principles and models used to secure information systems. Learners will explore secure design principles, various security models such as Bell-LaPadula, Biba, and Clark-Wilson, and how these models shape system security. The module also focuses on the application of memory protections, trusted platform modules (TPMs), and selecting the right security controls to build robust systems.
What's included
11 videos2 readings
This module dives into the vulnerabilities that impact various systems including client, server, database, cloud, and IoT. It also provides an in-depth exploration of cryptographic systems, including encryption basics, Public Key Infrastructure (PKI), digital signatures, and cryptographic attacks. Learners will gain a comprehensive understanding of how to safeguard different environments from security vulnerabilities and cryptographic threats.
What's included
22 videos1 reading1 assignment
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
University of Colorado System
ISC2
Coursera Instructor Network
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy