This in-depth course on Security Architecture and Engineering aligns with the latest CISSP curriculum and is designed to enhance your expertise in building and securing IT environments. You'll start by exploring secure design principles and key security models like Bell-LaPadula, Biba, and Clark-Wilson, giving you a strong foundation in designing secure systems. From there, you’ll delve into security control implementation, memory protection, and encryption techniques, ensuring you understand how to protect both data in motion and at rest.
Security Architecture and Engineering
This course is part of CISSP Certified Information Systems Security Professional Specialization
Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Understand and implement common security models, including Bell-LaPadula and Biba, in system design.
Identify vulnerabilities in client-server, cloud, and IoT systems, and develop strategies to mitigate them.
Utilize cryptography and PKI to secure sensitive data and communications.
Design and implement physical security controls to safeguard facilities and infrastructure.
Skills you'll gain
Details to know
Add to your LinkedIn profile
October 2024
1 assignment
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 2 modules in this course
This module introduces the foundational security design principles and models used to secure information systems. Learners will explore secure design principles, various security models such as Bell-LaPadula, Biba, and Clark-Wilson, and how these models shape system security. The module also focuses on the application of memory protections, trusted platform modules (TPMs), and selecting the right security controls to build robust systems.
What's included
11 videos2 readings
This module dives into the vulnerabilities that impact various systems including client, server, database, cloud, and IoT. It also provides an in-depth exploration of cryptographic systems, including encryption basics, Public Key Infrastructure (PKI), digital signatures, and cryptographic attacks. Learners will gain a comprehensive understanding of how to safeguard different environments from security vulnerabilities and cryptographic threats.
What's included
22 videos1 reading1 assignment
Instructor
Offered by
Recommended if you're interested in Computer Security and Networks
Why people choose Coursera for their career
New to Computer Security and Networks? Start here.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.