Defense in-Depth and Attacks

Categories: Cybersecurity
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The course begins with an examination of the foundations of information assurance, looking at how security threats affect confidentiality, integrity, and availability. From there, it delves into identity and access management (IAM), discussing modern authentication methods and password security, particularly as they relate to cloud computing. IAM is emphasized as a key security perimeter in cloud environments.

The focus then shifts to modern security controls, including frameworks such as the Center for Internet Security (CIS) Controls, the NIST Cybersecurity Framework, and the MITRE ATT&CK knowledge base. These help protect against contemporary threats.

The course also explores mobile device security, highlighting the benefits and risks of mobile technology. Topics include Bring Your Own Device (BYOD) and Mobile Device Management (MDM), offering a comprehensive understanding of mobile technology’s impact on security.

Show More

What Will You Learn?

  • Information Assurance Foundations: Explore the core principles of information assurance, focusing on how security threats impact confidentiality, integrity, and availability.
  • Identity and Access Management: Dive into identity and access management (IAM), discussing modern authentication methods and password security, especially in relation to cloud computing. Understand why IAM is a crucial security perimeter in cloud environments.
  • Modern Security Controls: Learn about contemporary security frameworks such as the Center for Internet Security (CIS) Controls, the NIST Cybersecurity Framework, and the MITRE ATT&CK knowledge base to protect against modern threats.
  • Mobile Device Security: Conclude with a focus on mobile device security, examining the benefits and risks of mobile technology, including topics like Bring Your Own Device (BYOD) and Mobile Device Management (MDM).

Course Content

Introduction Defense-in-Depth and Attacks

  • Introduction

Defense-in-Depth

Access Control and Password Management

Security Policies

Critical Security Controls

Malicious Code and Exploit Mitigations

Advanced Persistent Threat

Student Ratings & Reviews

No Review Yet
No Review Yet