Course curriculum

  • 1

    Domain Introduction - Initial Mindmap

    • Domain 3 - Coverage Mindmap

  • 2

    Secure Design Principles

    • Secure Design Principles

    • Secure Engineering Principles

  • 3

    Implementing Secure Design Principles

  • 4

    Security Models

    • Multilayer Systems

    • Security Models Overview

    • Bell-LaPadula Security Model

    • Biba Integrity Model

    • Clark Wilson Integrity Model

    • Brewer Nash Model

  • 5

    Security Requirements and Control Selection

    • Security Requirements and Control Selection

    • Product Evalutation

  • 6

    Security Capabilities of Information Systems

    • Security in Cryptosystems

    • Security Crypto Systems (Contd..)

  • 7

    Vulnerabilities in Information Systems

    • Vulnerabilities in Information Systems

    • Vulnerabilities in Database Systems

    • Vulnerabilities in Cryptographic Systems

    • Vulnerabilities in ICS Systems

    • Vulnerabilities in Cloud Systems

    • Vulnerabilities in Distributed Systems

    • Vulnerabilities in IoTs

    • Vulnerabilities in Mobile Systems

    • Embedded Systems

  • 8

    Vulnerabilities in Web Based Systems (OWASP Top 10)

    • Web Vulnerabilieis -OWASP Top 10

      FREE PREVIEW
    • Injection Vulnerabilities

    • Cross Site Scripting (XSS) Vulnerability

    • Broken Access Control Vulnerability

    • Sensitive Data Exposure Vulnerability

    • Cross Site Request Forgery (CSRF)

    • External Entitiy Vulnerability (XXE)

    • Other OWASP Vulnerabilities

  • 9

    Cryptography

  • 10

    Modern Cryptography

    • Modern Cryptography Concepts

    • Transposition Cipher

      FREE PREVIEW
    • Characteristics of a Good Modern Cipher

    • Block Cipher

    • Stream Cipher

    • Block Cipher Implementations

    • Symmetric Cryptography

    • Symmetric Algorithms DES | 3DES | AES | Others

    • Asymmetric Cryptography

    • Asymmetric Algorithms RSA | El Gamel | ECC

    • Symmetric Vs Asymmetric Cryptography

    • Understanding Hashing

    • Hashing Algorithms Key Stretching and Passwords Storage

    • Hybrid Cryptography

  • 11

    Applied Cryptography

  • 12

    Physical Security

    • Physical Security

    • Physical Security Engineering Principles

    • Secure Facility Desing

    • Physical Security Controls

    • Physcial Intrusion Detection Systems

    • Data Center and Server Room Security

    • Emanations Threats and Security

    • Equipment Failures

    • Media and Evidence Security

    • Fire Detection and Supression

    • Utility Services Security

    • Parameter Security