Secure Design Principles
Course | 39 minutes
Explore the principles behind secure system design, ranging from security models to certification and accreditation.
Secure Network Design
Course | 26 minutes
Explore key concepts behind secure network design, including tools to keep threats out and techniques to detect and deflect intruders that breach your defenses.
Distributed System & Virtualized Networks
Course | 20 minutes
Explore the use of distributed and virtualized systems as well as the security benefits and potential drawbacks involved in their use.
WAN & Remote Access Security
Course | 33 minutes
Learn about securing wide area networks (WAN) and remote access against different types of cyber threats in this five-video course.
System Protection Mechanisms
Course | 32 minutes
Learn about different system protection mechanisms and common issues such as Web-based vulnerabilities, architecture flaws and more.
Physical Security
Course | 52 minutes
Don’t forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.
Data Center Security
Course | 21 minutes
Don’t let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.
Secure Software Development
Course | 43 minutes
Explore the ins and outs of secure software development as you progress through this nine-video course.
Disaster Recovery
Course | 36 minutes
Don’t let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.
Business Continuity Planning
Course | 19 minutes
Learn how to keep your business up and running. Explore the importance of continuity planning, incident response planning and impact analysis.
Network Security Components
Course | 44 minutes
In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.
Securing Host Devices
Course | 20 minutes
Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.
Secure Storage Controls
Course | 29 minutes
Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.
Software Vulnerabilities and Security Controls
Course | 37 minutes
In this course, we take you through the fundamentals of software vulnerabilities and security controls.
Security Engineering Principles
Course | 22 minutes
Review the security principles that security engineers need to know in order to implement systems
Risk Management
Course | 7 minutes
Get a basic understanding or risk management in an organization
System Resilience Principles
Course | 10 minutes
Dive into defense-in-depth and other principles and methods of making your systems resilient.
Vulnerability Management Principles
Course | 13 minutes
Know why it’s important to manage vulnerabilities, and what the engineer’s role is.
Risk Management Process
Course | 37 minutes
Walk through the security risk management process and learn best practices.
Operational Risk Management
Course | 30 minutes
Understand how today’s complex business environment impacts operational risk and related controls
Stakeholder Requirements Definition
Course | 14 minutes
Review how different stakeholders impact security planning, design and implementation.
Requirements Analysis
Course | 7 minutes
Discover the process for analyzing requirements before designing security systems.
System Security Architecture and Design
Course | 12 minutes
Review the core components and processes of security architecture and design.
Implementation, Integration and Deployment of System Modifications
Course | 5 minutes
Learn the basics of system implementation, integration and deployment.
Verification and Validation of Systems or System Modifications
Course | 10 minutes
Go through the post-deployments steps of ensuring the system is adequately secure.
Secure Operations
Course | 30 minutes
Understand the basics of maintaining a secure operations strategy..
Secure Maintenance
Course | 13 minutes
Learn about the three main areas of secure maintenance and related strategies.
Secure Disposal
Course | 8 minutes
Know how to handle a system at the end of its lifecycle and the key security considerations.
Acquisition Process
Course | 15 minutes
Know what’s involved in the systems acquisition phase and how to prepare for it.
System Development Methodologies
Course | 3 minutes
Understand the advantages and disadvantages of different development methods.
Technical Management Processes
Course | 32 minutes
Dive deep into the technical aspects of managing systems engineering
Secure Design Principles
Course | 39 minutes
Explore the principles behind secure system design, ranging from security models to certification and accreditation.
Secure Network Design
Course | 26 minutes
Explore key concepts behind secure network design, including tools to keep threats out and techniques to detect and deflect intruders that breach your defenses.
Distributed System & Virtualized Networks
Course | 20 minutes
Explore the use of distributed and virtualized systems as well as the security benefits and potential drawbacks involved in their use.
WAN & Remote Access Security
Course | 33 minutes
Learn about securing wide area networks (WAN) and remote access against different types of cyber threats in this five-video course.
System Protection Mechanisms
Course | 32 minutes
Learn about different system protection mechanisms and common issues such as Web-based vulnerabilities, architecture flaws and more.
Physical Security
Course | 52 minutes
Don’t forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.
Data Center Security
Course | 21 minutes
Don’t let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.
Secure Software Development
Course | 43 minutes
Explore the ins and outs of secure software development as you progress through this nine-video course.
Disaster Recovery
Course | 36 minutes
Don’t let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.
Business Continuity Planning
Course | 19 minutes
Learn how to keep your business up and running. Explore the importance of continuity planning, incident response planning and impact analysis.
Network Security Components
Course | 44 minutes
In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.
Securing Host Devices
Course | 20 minutes
Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.
Secure Storage Controls
Course | 29 minutes
Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.
Software Vulnerabilities and Security Controls
Course | 37 minutes
In this course, we take you through the fundamentals of software vulnerabilities and security controls.
Security Engineering Principles
Course | 22 minutes
Review the security principles that security engineers need to know in order to implement systems
Risk Management
Course | 7 minutes
Get a basic understanding or risk management in an organization
System Resilience Principles
Course | 10 minutes
Dive into defense-in-depth and other principles and methods of making your systems resilient.
Vulnerability Management Principles
Course | 13 minutes
Know why it’s important to manage vulnerabilities, and what the engineer’s role is.
Risk Management Process
Course | 37 minutes
Walk through the security risk management process and learn best practices.
Operational Risk Management
Course | 30 minutes
Understand how today’s complex business environment impacts operational risk and related controls
Stakeholder Requirements Definition
Course | 14 minutes
Review how different stakeholders impact security planning, design and implementation.
Requirements Analysis
Course | 7 minutes
Discover the process for analyzing requirements before designing security systems.
System Security Architecture and Design
Course | 12 minutes
Review the core components and processes of security architecture and design.
Implementation, Integration and Deployment of System Modifications
Course | 5 minutes
Learn the basics of system implementation, integration and deployment.
Verification and Validation of Systems or System Modifications
Course | 10 minutes
Go through the post-deployments steps of ensuring the system is adequately secure.
Secure Operations
Course | 30 minutes
Understand the basics of maintaining a secure operations strategy..
Secure Maintenance
Course | 13 minutes
Learn about the three main areas of secure maintenance and related strategies.
Secure Disposal
Course | 8 minutes
Know how to handle a system at the end of its lifecycle and the key security considerations.
Acquisition Process
Course | 15 minutes
Know what’s involved in the systems acquisition phase and how to prepare for it.
System Development Methodologies
Course | 3 minutes
Understand the advantages and disadvantages of different development methods.
Technical Management Processes
Course | 32 minutes
Dive deep into the technical aspects of managing systems engineering