Application, Data, and Host Security Scenarios
Application, Data, and Host Security Scenarios
Regular price
$808 USD
Regular price
Sale price
$808 USD
Unit price
per
Secure every server, defend every datum! Dive into scenarios that challenge and change the way you see cybersecurity. Be the shield the digital domain desires. Defend, deter, dominate!
Course Duration:5 hours
Credits:
CEU Credits: 0.5
AMA PCM CEU Credits: 0
PDU Credits: 5
HRCI Credits: 5
SHRM Credits: 0
CFRE Credits: 0
ATD CI Credits: 5
ACE Credits: 0
Course Description
When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.
Learning Outcomes
Discuss the role of security in software development
Explain the software development life cycle and compare its eight stages
Understand what the operating system is and how it works
Describe different application and operating environments
Discuss the role of databases and the information security challenges they raise
Understand the various vectors for attack
Explain the objectives of Trusted Recovery and the concept of system hardening
Recognize the need for physical security and the varying means of achieving it
Recognize the need for physical security and the varying means of achieving it
Apply security concepts to real-world scenarios highlighting the need for application, data, and host security
Testimonials
Adetayo A.
It is a wonderful system of learning.