Users Online

· Guests Online: 89

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

CySA+ Cert Prep: 6 Security Tools and Practices

CySA+ Cert Prep: 6 Security Tools and Practices

Created by Mike Chapple


02_03. Separation of duties and responsibilities



Prepare to take and pass the CompTIA Cybersecurity Analyst (CySA+) exam. This course covers essential concepts that can prepare you for the final portion of domain four, Security Architecture and Tool Sets.


As an IT security analyst, vulnerability analyst, or threat intelligence analyst, earning the intermediate CompTIA Cybersecurity Analyst (CySA+) certification shows that you have the skills needed to protect your organization from a variety of cybersecurity threats. In this course—the sixth installment in the CySA+ Cert Prep series—review key security tools and practices that can prepare you for the final portion of domain four, Security Architecture and Tool Sets. Instructor Mike Chapple shares how to design secure networks, use cryptography to keep information safe, and use security best practices in the software development lifecycle. He also goes over best practices for secure coding, shares how to defend against top software security threats, and more. We are now a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.

Topics include:

Defense in depth
Separation of duties and responsibilities
Designing secure networks
VLANs and network segmentation
Goals of cryptography
Choosing encryption algorithms
Integrating security in the software development lifecycle
DevOps
Software assessment and testing
Code reviews and code tests




      
Course Contents
01 Introduction 02 Defense in Depth 03 Designing Secure Networks 04 Cryptography 05 Software Development Lifecycle 06 Secure Coding Best Practices 07 Software Assessment and Testing 08 Software Security Threats 09 Cybersecurity Toolkit 10 Next Steps

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.86 seconds
10,833,751 unique visits