We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security Architecture and Engineering

Security Controls and Vulnerabilities for CISSP®

Kevin Henry

This course will teach you the essential requirements to design a security architecture as needed for the Certified Information Systems Security Professional examination.

Read more

This course will teach you the essential requirements to design a security architecture as needed for the Certified Information Systems Security Professional examination.

Many organizations address information security too late in the security lifecycle. In this course, Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®, you’ll learn the security concepts and controls required to develop an enterprise-wide security architecture. First, you’ll explore security principles. Next, you’ll discover how to secure various types of information systems. Finally, you’ll learn how to address the vulnerabilities in various technologies. When you’re finished with this course, you’ll have the skills and knowledge of security architecture and engineering needed for the Certified Information Systems Security Professional examination.

Enroll now

What's inside

Syllabus

Course Overview
Security Design Principles
Secure System Components
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skillsets specific to passing the Certified Information Systems Security Professional examination
Covers advanced information security concepts
Prerequisites required: extensive background in information security

Save this course

Save Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP® to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP® will develop knowledge and skills that may be useful to these careers:
IT Auditor
IT Auditors evaluate the security of an organization's IT infrastructure and systems. They work with Information Security Analysts and Information Security Engineers to assess the organization's security needs and develop security solutions. This course may be useful for IT Auditors because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. They assess the security of an organization's IT infrastructure and develop security policies and procedures. This course may be useful for Information Security Analysts because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
DevSecOps Engineer
DevSecOps Engineers work with developers and operations teams to integrate security into the software development lifecycle. They help to ensure that security is considered from the early stages of software development and that security measures are implemented throughout the development process. This course may be useful for DevSecOps Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Cybersecurity Analyst
Cybersecurity Analysts investigate and respond to cyberattacks. They work with Information Security Analysts and Information Security Engineers to develop and implement security solutions. This course may be useful for Cybersecurity Analysts because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Network Security Engineer
Network Security Engineers design, implement, and maintain an organization's network security systems. They work with Information Security Analysts and Information Security Engineers to assess the organization's security needs and develop security solutions. This course may be useful for Network Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Security Consultant
Security Consultants provide security consulting services to organizations. They help organizations to assess their security risks, develop security policies and procedures, and implement security solutions. This course may be useful for Security Consultants because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Cloud Security Engineer
Cloud Security Engineers design and implement security solutions for an organization's cloud infrastructure. They work with Information Security Analysts and Information Security Engineers to assess the organization's security needs and develop security solutions. This course may be useful for Cloud Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Security Architect
Security Architects design and implement security solutions for an organization's IT infrastructure. They work with Information Security Analysts and Information Security Engineers to develop and implement security policies and procedures. This course may be useful for Security Architects because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Information Security Engineer
Information Security Engineers design, implement, and maintain an organization's information security systems. They work closely with Information Security Analysts to assess the organization's security needs and develop security solutions. This course may be useful for Information Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Security Manager
Security Managers are responsible for managing the security of an organization's IT infrastructure and systems. They work with Information Security Analysts, Information Security Engineers, and other IT professionals to develop and implement security policies and procedures. This course may be useful for Security Managers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Chief Information Security Officer
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization. They work with senior management to develop and implement security policies and procedures. They also work with other IT professionals to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for CISOs because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
CISO
CISOs are responsible for the overall security of an organization. They work with senior management to develop and implement security policies and procedures. They also work with other IT professionals to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for CISOs because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Chief Security Officer
Chief Security Officers (CSOs) are responsible for the overall security of an organization. They work with senior management to develop and implement security policies and procedures. They also work with other IT professionals to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for CSOs because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Technical Director of Information Security
Technical Directors of Information Security are responsible for the technical aspects of an organization's security. They work with other IT professionals to develop and implement security policies and procedures. They also work to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for Technical Directors of Information Security because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.
Principal Security Engineer
Principal Security Engineers are responsible for the design and implementation of an organization's security architecture. They work with other IT professionals to develop and implement security policies and procedures. They also work to ensure that the organization's IT infrastructure and systems are secure. This course may be useful for Principal Security Engineers because it teaches the essential requirements to design a security architecture, including security principles, securing various types of information systems, and addressing vulnerabilities in various technologies.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®.
Provides a comprehensive overview of malware analysis, covering the principles and practices of analyzing malicious software. It valuable resource for anyone who is interested in learning more about malware analysis.
Provides a comprehensive overview of web application security, covering the principles and practices of finding and exploiting security flaws in web applications. It valuable resource for anyone who is interested in learning more about web application security.
Provides a comprehensive overview of network security, covering the principles and practices of securing networks. It valuable resource for anyone who is interested in learning more about network security.
Provides a comprehensive overview of computer security, covering the principles and practices of securing computers and networks. It valuable resource for anyone who is interested in learning more about computer security.
Provides a comprehensive overview of cloud security, covering the principles and practices of securing cloud computing environments. It valuable resource for anyone who is interested in learning more about cloud security.
Provides a comprehensive overview of antivirus software.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Architecture and Engineering: Security Controls and Vulnerabilities for CISSP®.
Security Architecture and Engineering: Physical Security...
Most relevant
Security Architecture and Engineering: Secure Design...
Most relevant
Assessment/Audit of Security and Privacy Controls for CGRC
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Selection and Approval of Security and Privacy Controls...
Most relevant
Systems and Application Security for SSCP®
Most relevant
Implementation of Security and Privacy Controls for CGRC
Most relevant
Information and Cyber Security Literacy: Security...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser