Course curriculum

  • 1

    Summary of Changes

    • 1. Changes Mindmap

  • 2

    Security and Risk Management

    • 2. D1-Compliance checks

  • 3

    Security Architecture and Engineering

    • 3. D3- Error and Exceptions handling

    • 4. D3 -Cryptographic Attacks

    • 5. D3-DRM

    • 6. D3-High Performance Computing

    • 7. D3-Privacy By Design

    • 8. D3-Quantum Computing

  • 4

    Network and Communication Security

    • 9. D4- LiFi

    • 10. D4-JigBee

    • 11. D4- CASB

    • 12.D4-Cellular Comm

    • 13. D4- Edge Computing

    • 14. D4-Micro Segmentation

    • 15. SDWAN -SDN

    • 16. VXLAN

  • 5

    Identity and Access Management

    • 17. D5- Just in Time Access

    • 18. D5 - Risk Based Access Controls

    • 19. D5 - Trust But Verify

    • 20. D5- Zero Trust Architecture

  • 6

    Security Assessment and Testing

    • 21. D6- Breach and Attack Simulation

    • 22. D6- Responsible Disclosure

  • 7

    Security Operations

    • 23. D7- Artifacts

    • 24. D7- Privilege Escalation Attacks

    • 25. D7- SOAR

    • 26. D7- Threat Intel and Threat Hunting

    • 27. D7- UEBA

  • 8

    Software Development Security

    • 28. D8- Microservice Architecture

    • 29. D8 - Serverless Computing

    • 30. D8 Software Assurance Maturity Model