Security Architecture
Rated 3.5/5 based on 11 customer reviews

Security Architecture

Available: Out of Stock
$0.00

Request Info
The Security Architecture skill path teaches you enterprise security architecture concepts, including security architecture modeling, architecture for governance and compliance, infrastructure security and more.

Command Injection

Course | 39 minutes

This course introduces command injection vulnerabilities, their exploitation and possible mitigations.

Secure Design Principles

Course | 39 minutes

Explore the principles behind secure system design, ranging from security models to certification and accreditation.

Secure Software Design

Course | 25 minutes

Explore the methods of creating secure software, including development and maturity models and the secure software development life cycle.

Secure Software Development

Course | 43 minutes

Explore the ins and outs of secure software development as you progress through this nine-video course.

Distributed System & Virtualized Networks

Course | 20 minutes

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.

Cryptography Fundamentals

Course | 41 minutes

Explore the uses and challenges of cryptography. Learn about hashing, ciphers, digital signatures, types of cryptography and more.

Physical Security

Course | 52 minutes

Don’t forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.

Data Center Security

Course | 21 minutes

Don’t let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.

Network Security Components

Course | 44 minutes

In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.

Securing Host Devices

Course | 20 minutes

Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.

Secure Storage Controls

Course | 29 minutes

Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.

Software Vulnerabilities and Security Controls

Course | 37 minutes

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

Identity and Access Management Architecture

Course | 1 hour 23 minutes

Understand the lifecycle and the design of the identity management architecture.

Security Operations Architecture

Course | 1 hour 30 minutes

Know how to design and implement the appropriate architecture for security operations.

Infrastructure Security

Course | 1 hour 29 minutes

Get an overview of various protocols, controls and activities involved in designing infrastructure security

Architecture for Governance, Compliance and Risk Management

Course | 41 minutes

Discover the principles, processes and standards related to GRC (governance, risk management and compliance).

Security Architecture Modeling

Course | 41 minutes

Identify the correct approach for the organization’s security architecture

Architect for Application Security

Course | 34 minutes

Learn about common app-related threats and how to address them through the development lifecycle.

The Security Architecture skill path teaches you enterprise security architecture concepts, including security architecture modeling, architecture for governance and compliance, infrastructure security and more.

Command Injection

Course | 39 minutes

This course introduces command injection vulnerabilities, their exploitation and possible mitigations.

Secure Design Principles

Course | 39 minutes

Explore the principles behind secure system design, ranging from security models to certification and accreditation.

Secure Software Design

Course | 25 minutes

Explore the methods of creating secure software, including development and maturity models and the secure software development life cycle.

Secure Software Development

Course | 43 minutes

Explore the ins and outs of secure software development as you progress through this nine-video course.

Distributed System & Virtualized Networks

Course | 20 minutes

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.

Cryptography Fundamentals

Course | 41 minutes

Explore the uses and challenges of cryptography. Learn about hashing, ciphers, digital signatures, types of cryptography and more.

Physical Security

Course | 52 minutes

Don’t forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.

Data Center Security

Course | 21 minutes

Don’t let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.

Network Security Components

Course | 44 minutes

In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.

Securing Host Devices

Course | 20 minutes

Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.

Secure Storage Controls

Course | 29 minutes

Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.

Software Vulnerabilities and Security Controls

Course | 37 minutes

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

Identity and Access Management Architecture

Course | 1 hour 23 minutes

Understand the lifecycle and the design of the identity management architecture.

Security Operations Architecture

Course | 1 hour 30 minutes

Know how to design and implement the appropriate architecture for security operations.

Infrastructure Security

Course | 1 hour 29 minutes

Get an overview of various protocols, controls and activities involved in designing infrastructure security

Architecture for Governance, Compliance and Risk Management

Course | 41 minutes

Discover the principles, processes and standards related to GRC (governance, risk management and compliance).

Security Architecture Modeling

Course | 41 minutes

Identify the correct approach for the organization’s security architecture

Architect for Application Security

Course | 34 minutes

Learn about common app-related threats and how to address them through the development lifecycle.