We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you the essential requirements to design a security architecture as needed for the Certified Information Systems Security Professional examination.

Read more

This course will teach you the essential requirements to design a security architecture as needed for the Certified Information Systems Security Professional examination.

Many organizations address information security too late in the security lifecycle. In this course, Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®, you’ll learn the security concepts and controls required to develop an enterprise-wide security architecture. First, you’ll explore security principles. Next, you’ll discover how to secure various types of information systems. Finally, you’ll learn how to address the vulnerabilities in various technologies. When you’re finished with this course, you’ll have the skills and knowledge of security architecture and engineering needed for the Certified Information Systems Security Professional examination.

Enroll now

What's inside

Syllabus

Course Overview
Security Design Principles
Secure System Components
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skillsets specific to passing the Certified Information Systems Security Professional examination
Covers advanced information security concepts
Prerequisites required: extensive background in information security

Save this course

Save Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP® with these activities:
Review 'Security Engineering: A Guide to Building Dependable Distributed Systems' by Ross Anderson
Review the fundamentals of security engineering and dependable distributed systems.
Show steps
  • Read the first three chapters
  • Complete the practice exercises at the end of each chapter
  • Summarize the key concepts in your own words
Follow tutorials on security vulnerabilities
Learn about common security vulnerabilities and how to mitigate them.
Browse courses on Security Vulnerabilities
Show steps
  • Identify a tutorial on a specific security vulnerability
  • Follow the steps in the tutorial
  • Test your understanding by attempting to exploit the vulnerability in a simulated environment
Participate in a peer study group
Engage with peers to discuss course material, share insights, and reinforce learning.
Show steps
  • Find a study group or create your own
  • Meet regularly to discuss course material
  • Work together on practice exercises
Four other activities
Expand to see all activities and additional details
Show all seven activities
Attend a security workshop
Gain hands-on experience and insights from industry experts.
Show steps
  • Identify a relevant security workshop
  • Register for the workshop
  • Attend the workshop and participate actively
Practice security design principles
Gain hands-on experience applying security design principles to real-world scenarios.
Show steps
  • Identify the security requirements of a given system
  • Design a security architecture that meets those requirements
  • Implement the security architecture in a simulated environment
  • Test the security architecture for vulnerabilities
Develop a security policy
Draft a comprehensive security policy that outlines an organization's security posture and guidelines.
Browse courses on Security Policy
Show steps
  • Identify the scope and objectives of the security policy
  • Research industry best practices and regulations
  • Draft the security policy
  • Review and revise the security policy
Participate in a security competition
Test your skills and knowledge against other security professionals.
Show steps
  • Identify a relevant security competition
  • Register for the competition
  • Prepare for the competition
  • Participate in the competition

Career center

Learners who complete Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP® will develop knowledge and skills that may be useful to these careers:
IT Auditor
IT Auditors evaluate the security of an organization's IT infrastructure and systems. They work with Information Security Analysts and Information Security Engineers to assess the organization's security needs and develop security solutions. This course may be useful for IT Auditors because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. They assess the security of an organization's IT infrastructure and develop security policies and procedures. This course may be useful for Information Security Analysts because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
DevSecOps Engineer
DevSecOps Engineers work with developers and operations teams to integrate security into the software development lifecycle. They help to ensure that security is considered from the early stages of software development and that security measures are implemented throughout the development process. This course may be useful for DevSecOps Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Cybersecurity Analyst
Cybersecurity Analysts investigate and respond to cyberattacks. They work with Information Security Analysts and Information Security Engineers to develop and implement security solutions. This course may be useful for Cybersecurity Analysts because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Network Security Engineer
Network Security Engineers design, implement, and maintain an organization's network security systems. They work with Information Security Analysts and Information Security Engineers to assess the organization's security needs and develop security solutions. This course may be useful for Network Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Security Consultant
Security Consultants provide security consulting services to organizations. They help organizations to assess their security risks, develop security policies and procedures, and implement security solutions. This course may be useful for Security Consultants because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Cloud Security Engineer
Cloud Security Engineers design and implement security solutions for an organization's cloud infrastructure. They work with Information Security Analysts and Information Security Engineers to assess the organization's security needs and develop security solutions. This course may be useful for Cloud Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Security Architect
Security Architects design and implement security solutions for an organization's IT infrastructure. They work with Information Security Analysts and Information Security Engineers to develop and implement security policies and procedures. This course may be useful for Security Architects because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Information Security Engineer
Information Security Engineers design, implement, and maintain an organization's information security systems. They work closely with Information Security Analysts to assess the organization's security needs and develop security solutions. This course may be useful for Information Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Security Manager
Security Managers are responsible for managing the security of an organization's IT infrastructure and systems. They work with Information Security Analysts, Information Security Engineers, and other IT professionals to develop and implement security policies and procedures. This course may be useful for Security Managers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Chief Information Security Officer
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization. They work with senior management to develop and implement security policies and procedures. They also work with other IT professionals to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for CISOs because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
CISO
CISOs are responsible for the overall security of an organization. They work with senior management to develop and implement security policies and procedures. They also work with other IT professionals to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for CISOs because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Chief Security Officer
Chief Security Officers (CSOs) are responsible for the overall security of an organization. They work with senior management to develop and implement security policies and procedures. They also work with other IT professionals to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for CSOs because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Technical Director of Information Security
Technical Directors of Information Security are responsible for the technical aspects of an organization's security. They work with other IT professionals to develop and implement security policies and procedures. They also work to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for Technical Directors of Information Security because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Principal Security Engineer
Principal Security Engineers are responsible for the design and implementation of an organization's security architecture. They work with other IT professionals to develop and implement security policies and procedures. They also work to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for Principal Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®.
Provides a comprehensive overview of malware analysis, covering the principles and practices of analyzing malicious software. It valuable resource for anyone who is interested in learning more about malware analysis.
Provides a comprehensive overview of web application security, covering the principles and practices of finding and exploiting security flaws in web applications. It valuable resource for anyone who is interested in learning more about web application security.
Provides a comprehensive overview of network security, covering the principles and practices of securing networks. It valuable resource for anyone who is interested in learning more about network security.
Provides a comprehensive overview of computer security, covering the principles and practices of securing computers and networks. It valuable resource for anyone who is interested in learning more about computer security.
Provides a comprehensive overview of cloud security, covering the principles and practices of securing cloud computing environments. It valuable resource for anyone who is interested in learning more about cloud security.
Provides a comprehensive overview of antivirus software.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®.
Security Architecture and Engineering: Physical Security...
Most relevant
Security Architecture and Engineering: Secure Design...
Most relevant
Assessment/Audit of Security and Privacy Controls for CGRC
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Selection and Approval of Security and Privacy Controls...
Most relevant
Systems and Application Security for SSCP®
Most relevant
Implementation of Security and Privacy Controls for CGRC
Most relevant
Information and Cyber Security Literacy: Security...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser