CISSP Training - Domain 3: Security Architecture and Engineering (Under 1.5 Hours)

Explore the principles of secure design by researching, implementing, and managing engineering processes. Topics include threat modeling, least privilege, defense in depth, and secure defaults.

Hacker Black•4.8K views•01:21:04

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Research, implement and manage engineering processes using secure design principles. » Threat modeling » Least privilege » Defense in depth » Secure defaults » Fail securely » Separation of Duties (SoD) » Keep it simple » Zero Trust » Privacy by design » Trust but verify » Shared responsibility Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula) Select controls based upon systems security requirements Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption) Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements » Client-based systems » Server-based systems » Database systems » Cryptographic systems » Industrial Control Systems (ICS) » Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS)) » Distributed systems » Internet of Things (IoT) » Microservices » Containerization » Serverless » Embedded systems » High-Performance Computing (HPC) systems » Edge computing systems » Virtualized systems Select and determine cryptographic solutions Cryptographic life cycle (e.g., keys, algorithm selection) » Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves, quantum) » Public Key Infrastructure (PKI) » Key management practices » Digital signatures and digital certificates » Non-repudiation » Integrity (e.g., hashing) Understand methods of cryptanalytic attacks Apply security principles to site and facility design Design site and facility security controls » Brute force » Ciphertext only » Known plaintext » Frequency analysis » Chosen ciphertext » Implementation attacks » Side-channel » Fault injection » Timing » Man-in-the-Middle (MITM) » Pass the hash » Kerberos exploitation » Ransomware » Wiring closets/intermediate distribution facilities » Server rooms/data centers » Media storage facilities » Evidence storage » Restricted and work area security » Utilities and Heating, Ventilation, and Air Conditioning (HVAC) » Environmental issues » Fire prevention, detection, and suppression » Power (e.g., redundant, backup) The CISSP Exam Study Guide 2021 --- https://www.amazon.com/dp/B08WX9KTY3 The CISSP curriculum breaks the subject matter down into a variety of Information Security topics referred to as domains. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding." From 1st May 2021 there will be a domain refresh that will impact the weighting of the domains, the domains themselves will not change. Security and Risk Management Asset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Video Information

Views
4.8K

Total views since publication

Likes
97

User likes and reactions

Duration
01:21:04

Video length

Published
Feb 10, 2021

Release date

Quality
hd

Video definition