This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Associated Certification:
Module 1: Build an overall security strategy and architecture
Learn how to build an overall security strategy and architecture.
Lesson
After completing this module, students will be able to:
Module 2: Design a security operations strategy
Learn how to design a security operations strategy.
Lesson
After completing this module, students will be able to:
Module 3: Design an identity security strategy
Learn how to design an identity security strategy.
Lesson
After completing this module, students will be able to:
Module 4: Evaluate a regulatory compliance strategy
Learn how to evaluate a regulatory compliance strategy.
Lesson
After completing this module, students will be able to:
Module 5: Evaluate security posture and recommend technical strategies to manage risk
Learn how to evaluate security posture and recommend technical strategies to manage risk.
Lesson
After completing this module, students will be able to:
Module 6: Understand architecture best practices and how they are changing with the Cloud
Learn about architecture best practices and how they are changing with the Cloud.
Lesson
After completing this module, students will be able to:
Module 7: Design a strategy for securing server and client endpoints
Learn how to design a strategy for securing server and client endpoints.
Lesson
After completing this module, students will be able to:
Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services
Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.
Lesson
After completing this module, students will be able to:
Module 9: Specify security requirements for applications
Learn how to specify security requirements for applications.
Lesson
After completing this module, students will be able to:
Module 10: Design a strategy for securing data
Learn how to design a strategy for securing data.
Lesson
After completing this module, students will be able to:
IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.
This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
Associated Certification:
Module 1: Build an overall security strategy and architecture
Learn how to build an overall security strategy and architecture.
Lesson
After completing this module, students will be able to:
Module 2: Design a security operations strategy
Learn how to design a security operations strategy.
Lesson
After completing this module, students will be able to:
Module 3: Design an identity security strategy
Learn how to design an identity security strategy.
Lesson
After completing this module, students will be able to:
Module 4: Evaluate a regulatory compliance strategy
Learn how to evaluate a regulatory compliance strategy.
Lesson
After completing this module, students will be able to:
Module 5: Evaluate security posture and recommend technical strategies to manage risk
Learn how to evaluate security posture and recommend technical strategies to manage risk.
Lesson
After completing this module, students will be able to:
Module 6: Understand architecture best practices and how they are changing with the Cloud
Learn about architecture best practices and how they are changing with the Cloud.
Lesson
After completing this module, students will be able to:
Module 7: Design a strategy for securing server and client endpoints
Learn how to design a strategy for securing server and client endpoints.
Lesson
After completing this module, students will be able to:
Module 8: Design a strategy for securing PaaS, IaaS, and SaaS services
Learn how to design a strategy for securing PaaS, IaaS, and SaaS services.
Lesson
After completing this module, students will be able to:
Module 9: Specify security requirements for applications
Learn how to specify security requirements for applications.
Lesson
After completing this module, students will be able to:
Module 10: Design a strategy for securing data
Learn how to design a strategy for securing data.
Lesson
After completing this module, students will be able to:
IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.