CISSP Cert Prep: 3 Security Architecture and Engineering Part 2
Posted by Superadmin on December 24 2018 11:06:19

CISSP Cert Prep: 3 Security Architecture and Engineering Part 2

 

 

Certified Information Systems Security Professional (CISSP) is the gold standard in IT security certification. Prepare for domain three of the exam-Security Architecture and Engineering-in this installment of CISSP Cert Prep. Security engineering ensures systems are designed to deal with all sorts of risks and disruptions, from hackers and database meltdowns to electrical outages. In this course, security expert Mike Chapple covers everything you need to know to balance business needs with security risks and design more secure systems. He covers cloud computing, as well as hardware, web, and mobile security; client and server vulnerabilities; smart device security; and physical security, such as site design and monitoring. Plus, get a deep dive into cryptography, one of the most powerful tools that IT pros can use to secure data and accounts.

Topics include:
Understanding security design principles and models
Cloud computing and virtualization
Hardware security
Client and server vulnerabilities
Web security vulnerabilities
Securing mobile devices and smart devices
Understanding encryption
Symmetric and asymmetric cryptography
Key management and public key infrastructure
Physical security

 


10. Asymmetric Cryptography



 
 
 
44. Rivest-Shamir-Adleman (RSA)
45. PGP and GnuPG
46. Elliptic-curve and quantum cryptography



11. Key Management



 
 
 
 
47. Key exchange
48. Diffie-Hellman
49. Key escrow
50. Key stretching


12. Public Key Infrastructure



 
 
 
 
51. Trust models
52. PKI and digital certificates
52. PKI and digital certificates
54. Digital signatures
 
 
55. Create a digital certificate
55. Create a digital certificate


13. Cryptanalytic Attacks



 
 
13. Cryptanalytic Attacks
58. Knowledge-based attacks


14. Physical Security



 
 
 
 
59. Site and facility design
60. Data center environmental controls
61. Data center environmental protection
62. Physical security control types
 
 
63. Physical access control
64. Visitor management


Conclusion



 
Conclusion