Systems Engineering Culture: Cybersecurity
Systems Engineering
| Intermediate
- 18 videos | 1h 46m 52s
- Includes Assessment
- Earns a Badge
Building an organizational-level systems engineering culture enables organizations to tackle the challenges posed by complex systems, enhance collaboration and communication, mitigate risks, align with industry standards, and drive continuous improvement. In this course, you'll explore systems engineering for cybersecurity and software intensive systems, beginning with security and systems engineering, system safety, system hardware assurance, system design and threat modeling, risk planning and identification, and secure coding practices. Then, you'll learn about software security testing, secure software verification and validation standards, compliance, DevSecOps, and secure continuous integration/continuous delivery (CI/CD). Finally, you'll dig into cloud security, virtualization security, cybersecurity trends, cybersecurity case studies, and analyzing software security vulnerabilities.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline key considerations for security in systems engineeringProvide an overview of key system safety considerationsRecognize the various aspects of system hardware assuranceIdentify aspects of threat modeling and how it can be used to enhance cybersecurity in systems engineeringRecognize the importance of risk assessment in system engineering strategiesOutline secure coding practices and why they are importantProvide an overview of software security testing and various best practicesIdentify the principles surrounding secure software integration and verification
-
Recognize standards and compliance considerations in secure systems engineeringProvide an overview of devsecops practices and why they are important to systems engineeringProvide an overview of secure continuous integration/continuous delivery (ci/cd) pipelinesIdentify security principles of the cloud and outline how it is used to protect systemsIdentify security principles of virtualization and outline how it is used to protect systemsProvide an overview of emerging trends in cybersecurityOutline real-world case studies of successful cybersecurity implementations in software engineering projectsOutline a scenario analyzing a software system's security vulnerabilities, propose and implement security controls, and validate the effectiveness of security measuresSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 18sAfter completing this video, you will be able to outline key considerations for security in systems engineering. FREE ACCESS
-
5m 40sUpon completion of this video, you will be able to provide an overview of key system safety considerations. FREE ACCESS
-
6m 16sAfter completing this video, you will be able to recognize the various aspects of system hardware assurance. FREE ACCESS
-
6m 3sUpon completion of this video, you will be able to identify aspects of threat modeling and how it can be used to enhance cybersecurity in systems engineering. FREE ACCESS
-
6m 49sAfter completing this video, you will be able to recognize the importance of risk assessment in system engineering strategies. FREE ACCESS
-
6m 18sUpon completion of this video, you will be able to outline secure coding practices and why they are important. FREE ACCESS
-
8m 11sAfter completing this video, you will be able to provide an overview of software security testing and various best practices. FREE ACCESS
-
6m 8sUpon completion of this video, you will be able to identify the principles surrounding secure software integration and verification. FREE ACCESS
-
7m 24sAfter completing this video, you will be able to recognize standards and compliance considerations in secure systems engineering. FREE ACCESS
-
7m 36sUpon completion of this video, you will be able to provide an overview of DevSecOps practices and why they are important to systems engineering. FREE ACCESS
-
6m 35sAfter completing this video, you will be able to provide an overview of secure continuous integration/continuous delivery (CI/CD) pipelines. FREE ACCESS
-
6m 57sUpon completion of this video, you will be able to identify security principles of the cloud and outline how it is used to protect systems. FREE ACCESS
-
5m 54sAfter completing this video, you will be able to identify security principles of virtualization and outline how it is used to protect systems. FREE ACCESS
-
5m 55sUpon completion of this video, you will be able to provide an overview of emerging trends in cybersecurity. FREE ACCESS
-
4m 55sAfter completing this video, you will be able to outline real-world case studies of successful cybersecurity implementations in software engineering projects. FREE ACCESS
-
5m 48sIn this video, we will outline a scenario analyzing a software system's security vulnerabilities, propose and implement security controls, and validate the effectiveness of security measures. FREE ACCESS
-
55sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.