Vi ste ovdje
Overview/Description
One of the building blocks of successful IT security practices is a fundamental understanding of operating system security. This course provides an introduction to the concept of user authentication, including multifactor and Remote Authentication Dial-In User Service (RADIUS) authentication. This course also covers key concepts of permissions, such as file, Active Directory, share, and group permissions. Finally, this course covers fundamental security policies including password and audit policies, as well as encryption and malware best practices. This course is one of...
Overview/Description
One of the building blocks of successful IT security practices is a fundamental understanding of network security. This course introduces key concepts about dedicated firewalls and methods including packet filtering, circuit-level, application-level, and stateful multilevel firewalls. This course also covers types of inspection, and stateful v. stateless inspection. Finally, this course covers best practices for Network Access Protection, network isolation methods, and protocol security concepts including common network attack methods. This course is one of a series in...
Overview/Description
One of the building blocks of successful IT security practices is a fundamental understanding of security software. This course introduces learners to client protection practices, including methods for dealing with malware, antivirus for client protection, and using User Account Control, or UAC. This course also includes fundamental best practices for e-mail protection and server protection, including server hardening. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam....
Overview/Description
A fundamental understanding of the potential risks, vulnerabilities and exposures throughout the software lifecycle is the basis for ensuring overall software security. In this course, you'll learn about the core concepts of confidentiality, integrity, authentication, and authorization. You'll also be introduced to security design principles such as least privilege, separation of duties, fail safe, and economy of mechanism. Finally, this course covers best practices for governance, risk, and compliance throughout the software lifecycle. This course is one of a series in...
Overview/Description
Integrating security into the software development process and identifying key security objectives is paramount to successful secure software development. In this course, you'll learn about internal and external security requirements and how to classify and categorize data. You'll also explore functional requirements such as role and user definitions, the role of the deployment environment on requirements, and sequencing and timing requirements. Finally, this course covers operational requirements such as deployment and management solutions. This course is one of a...
Overview/Description
Security practices must be integrated in every aspect of software design. In this course, you'll explore secure software design processes such as attack surface evaluation, threat modeling, control identification, and prioritization. You'll also be introduced to specific design considerations to keep in mind like addressing core security concepts and interconnectivity. Finally, this course covers best practices for securing commonly used architecture and technologies like virtualization, database, and the programming language environment. This course is one of a series...
Overview/Description
Building security controls within software implementation and coding is vital for end-product software security. In this course, you'll learn about declarative versus programmatic security, how to use Open Web Application Security Project or OWASP and Common Weakness Enumeration or CWE as great security sources, and some defense coding practices and controls such as configuration, error handling, and session management. This course also covers some essential secure coding techniques such as versioning, peer-based code reviews, code analysis, and anti-tampering techniques...
Overview/Description
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing information is subtly different. This Skillsoft course will get you on the right track to begin your CISSP study.
Target Audience
Candidates for the (ISC)² CISSP 2015 certification
Prerequisites
None
Expected Duration (hours)
0.5
Lesson Objectives
Changes to CISSP 2015
start the course
describe the high level changes in (ISC)² CISSP 2015 with...
Overview/Description
The convergence of voice, video, and data has not only changed the conceptual network models but has also affected the way that networks support services and applications. Planning routing services to support requirements requires an understanding of the Cisco Enterprise Architectures and how they align with the traditional three-layer hierarchical network model. Understanding of the network traffic moving throughout the architecture is also important. To create an implementation plan, you must have detailed network information, tools, resources, and a work plan. By...
Overview/Description
In routing environments, Enhanced Interior Gateway Routing Protocol (EIGRP) offers benefits and features over historical distance-vector routing protocols such as Routing Information Protocol version 1 (RIPv1). These benefits include rapid convergence, lower bandwidth utilization, and multiple routed protocol support besides IP. As an administrator, understanding the EIGRP commands used to configure a router is essential, especially during initial configuration or routing protocol migration. EIGRP can also operate over various underlying network technologies – Ethernet...