CISSP 2021: Secure Design Principles
CISSP
| Expert
- 11 videos | 40m 23s
- Includes Assessment
- Earns a Badge
Security design principles are crucial while designing any security mechanism for a system. This course will help you gain a better understanding of how these principles help develop a secure system, which prevents security flaws and also blocks unwanted access to it. Get familiar with security concepts and principles such as defense in depth, least privilege, and zero trust and explore them further with the help of real-world applications and use cases. After completing this course, you'll be aware of the significance of methodologies for implementing separation of duties, secure defaults, secure failure, and privacy by design while avoiding over-complexity.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the security principle of least privilege and provide real-world examplesDescribe the security principle of defense in depth (did) and provide real-world examplesDescribe the security principle of separation of duties (sod) and provide real-world examplesDescribe what it means to "keep it simple" in the context of a security principle with real-world examplesDefine the characteristics of the zero trust (zt) principle and zero trust architecture (zta)
-
Outline the design principles and use cases of secure defaultsRecognize the characteristics of secure failure and differentiate between fail open and fail closed firewallsDescribe the security principle of privacy by design and provide real-world examplesList use cases for the trust but verify security principleSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 37sThis course introduces you to secure design principles that will help you design any security mechanism for a system. Learn to prevent security flaws and block unwanted access. Study security concepts and principles, such as defense in depth, least privilege, and zero trust. FREE ACCESS
-
4m 49sIn this video, we examine the security principle of least privilege and provide real-world examples. Learn about Authentication Authorization Accounting (AAA), Identity and Access Management (IAM), and hypervisors. FREE ACCESS
-
7m 34sThis video examines the security principle of Defense in Depth (DiD), and provides real-world examples. Learn about supply chain risk management, de-perimeterization, monitoring and response operations, prevention, policy management, and endpoint security. FREE ACCESS
-
6m 51sThis video explores the security principle of separation of duties (SoD) and provides real-world examples. Review separation of duties in Agile, Spiral. and CI/CD development. Consider dual operator principles, rotation of duties, and other security strategies. FREE ACCESS
-
3m 4sIn this video, we see what it means to "keep it simple" in the context of a security principle with real-world examples. Learn how to find the delicate balance between security and protecting data, applications, and systems, while still maintaining user productivity. FREE ACCESS
-
4m 44sIn this video, we define the characteristics of the Zero Trust (ZT) principle and of zero trust architecture (ZTA). We examine ZT from a management standpoint, a security management perspective, and an information security administration point of view. FREE ACCESS
-
3m 3sIn this video, we examine secure design principles and use cases of secure defaults. We compare the strategies of security by design, security by deployment, security by default, and security through obscurity. FREE ACCESS
-
2m 46sIn this video, we review the characteristics of secure failure, and differentiate between fail open and fail closed systems, such as firewalls or other appliances. We then compare the benefits and risks of both security approaches. FREE ACCESS
-
3m 37sIn this video, we look at the security principle of privacy by design, and provide real-world examples. We will use the NIST Privacy Framework as our prototype. The NIST Privacy Framework is a tool to improve privacy through Enterprise Risk Management. FREE ACCESS
-
1m 35sIn this video, we list use cases for the Trust but Verify security principle. Trust but Verify is not a "zero trust" approach to security, however, it does introduce stronger identification mechanisms, such as multi-factor authentication (MFA). FREE ACCESS
-
44sIn this course, we examined secure design principles that are useful to any security mechanism for a system. We observed how to prevent security flaws and block unwanted access. We discussed security concepts and principles, such as defense in depth, least privilege, and zero trust. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.