Security Architecture and Design: The Big Picture

Security Architecture and Design: The Big Picture

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 4h 24m | 564 MB

Company security breaches are a daily news occurrence, and they affect companies of all sizes in every industry. This course will give you the essential foundation to design and architect a secure solution to protect a company’s data and assets.

Every day we hear of another company that’s been hacked many with millions of user records stolen, leaked to the dark web, or sold to the highest bidder. Understanding what makes an effective security posture is essential to combating this ever-changing threat. In this course, Security Architecture and Design: The Big Picture, you’ll learn the essential foundations of what makes an effective information security program along with what infrastructure and applications are required. First, you’ll learn about installing and configuring network components, then you’ll learn about secure protocols. Next, you’ll explore implementing secure network architecture and troubleshooting common security issues. Finally, you’ll discover secure systems design, application development and deployment, and physical security controls. When you’re finished this course, you’ll have a good understanding of the various pieces that make up a solid security posture. Not only will you understand all major components of information security, but also how they fit together, and how to architect them according to best practices, to protect a company’s data and digital assets.

Table of Contents

Course Overview
1 Course Overview

Setting the Stage
2 Setting the Stage – Who Should Watch This Course
3 Course Overview
4 Security Teams
5 Offensive and Defensive Teams

Installing and Configuring Network Components
6 Module Intro
7 TCP IP and OSI Models
8 Firewalls
9 Web Application Firewalls
10 Virtual Private Networks VPN
11 Transport Encryption
12 NIDS and NIPS
13 IDS IPS Workflow
14 Four Approaches to IDS
15 Network Based IDS
16 Reacting to Alerts or Issues
17 Routers and Common Routing Protocols
18 Switches
19 Layer 2 vs. Layer 3
20 Load Balancers
21 Load Balancer Types
22 Web Security Gateways
23 Port Security and 802.1x
24 Loop Protection and Flood Guards
25 Spanning Tree Protocol STP
26 Access Points and WiFi Security
27 Security Information and Event Management SIEM
28 Data Loss Prevention DLP
29 Network Access Control NAC
30 Hardware Based Encryption
31 Mail Gateway
32 Additional Things to Consider

Implementing Secure Protocols
33 Module Intro
34 Networking Protocols
35 DNS SEC
36 SSH
37 S MIME
38 SRTP
39 LDAPS
40 FTPS and SFTP
41 SNMPv3
42 SSL TLS
43 HTTPS
44 Secure POP IMAP
45 Use Cases

Implementing Secure Network Architecture
46 Module Intro and Topology Overview
47 Additional Topology Concepts
48 Security Segmentation and Isolation
49 Virtualization
50 Air Gaps
51 VPN
52 Security Device Placement
53 Software Defined Networking SDN

Troubleshooting Common Security Issues
54 Module Intro
55 Unencrypted Credentials
56 Logs and Event Anomalies
57 Access Violations
58 Certificate Issues and Hierarchy
59 Misconfigured Devices
60 Weak Security Configuration
61 Personnel Issues
62 Unauthorized Software
63 Baseline Deviation and License Compliance
64 Asset Management
65 Authentication Issues

Implementing Secure Systems Design
66 Module intro and Secure Boot
67 Measured Launch
68 Integrity Measurement Architecture IMA
69 BIOS UEFI
70 Data Encryption Hardware Based Encryption
71 Types of Data to Secure
72 Supply Chain Security
73 Hardware Root of Trust
74 EMI EMP
75 Trusted OS
76 Secure Systems Design
77 Mobile Device Management
78 Peripherals Security

Secure Application Development and Deployment
79 Module Intro
80 Development Life-cycle Models
81 Waterfall Development Model
82 Secure DevOps
83 Security Automation
84 Continuous Integration
85 Baselining and CI CD
86 Immutable Systems
87 Infrastructure as Code
88 General Change Management
89 Provisioning Deprovisioning and Asset Disposal
90 SDLC
91 Secure Coding Techniques
92 Code Quality and Testing
93 Static Code Analysis
94 Fuzzing
95 Secure Coding Concepts
96 Compiled vs. Runtime Code

Physical Security Controls
97 Module Intro
98 Proper Lighting and Signage
99 Fencing
100 Guards
101 Alarms
102 Securing Physical Asssets
103 Protected Distribution Systems PDS
104 Airgap Networks
105 Hardware Locks
106 Mantraps
107 EMI Shielding
108 Proximity Readers
109 Biometrics
110 Barricades
111 HVAC
112 Hot and Cold Aisles
113 Fire Suppression
114 Screen Filters
115 Cameras and Video Surveillance
116 Motion Detection and Infrared
117 Logs
118 Key Management