Integrity Training – Certified Security Principles+ (CSP+)
This course will introduce students to IT security, as well as teach them about risk management, understanding of cryptography, understanding identity and access management, managing data security, managing network security, managing server/host security, application security for non-developers, understanding mobile device security (IoT), managing day to day security, and understanding compliance and auditing.
This course begins with an introduction to IT security, and proceeds to a discussion of risk management in terms of risks and vulnerabilities, cryptography in terms of encryption algorithms and usage, identity and access management including authorization and monitoring, managing data security, managing network security, managing server/host security and application security for non-developers. Mobile device security is covered with reference to the Internet of Things (IoT). The course concludes with a discussion of managing day to day security and understanding compliance and auditing.
Course Curriculum
Course Introduction
Start
Introduction (15:54)
Chapter 01 – Introduction to IT Security
Start
Introduction to IT Security (0:54)
Start
Understanding Security (26:14)
Start
Responsibilities (22:34)
Start
Building a Security Program (27:51)
Start
CIA Triad (10:13)
Start
Governance, Risk, Compliance (17:51)
Start
State of Security Today (10:57)
Start
Chapter 01 Quiz
Chapter 02 – Risk Management
Start
Risk Management Introduction (1:07)
Start
Risk Management (19:05)
Start
Risk Assessment (16:16)
Start
Types of Risk, Threats and Vulnerabilities (29:29)
Start
Mitigating Attacks (24:41)
Start
Discovering Vulnerabilities and Threats Part 1 (17:35)
Start
Discovering Vulnerabilities and Threats Part 2 (14:25)
Start
Discovering Vulnerabilities and Threats Part 3 (17:55)
Start
Discovering Vulnerabilities and Threats Part 4 (13:23)
Start
Responding to Risk (9:59)
Start
Chapter 02 Quiz
Chapter 03 – Understanding of Cryptography
Start
Understanding of Cryptography Introduction (1:45)
Start
Understanding Cryptography (8:35)
Start
Asymmetric Encryption (17:36)
Start
Symmetric Encryption (28:54)
Start
Hashing (13:32)
Start
PKI (10:30)
Start
Cryptography in Use (14:00)
Start
Chapter 03 Quiz
Chapter 04 – Understanding Identity and Access Management
Start
Understanding Identity and Access Management (0:20)
Start
Identity Management (14:27)
Start
Authentication Techniques (17:27)
Start
Single Sign-on (28:22)
Start
Access Control Monitoring (11:28)
Start
Chapter 04 Quiz
Chapter 05 – Managing Data Security
Start
Managing Data Security (0:50)
Start
Different Types of Storage (33:34)
Start
Encryption Options (13:10)
Start
Data Management (29:24)
Start
Chapter 05 Quiz
Chapter 06 – Managing Network Security
Start
Managing Network Security (1:38)
Start
Protocols and Services (28:29)
Start
Network and Security Devices Part 1 (20:31)
Start
Network and Security Devices Part 2 (22:17)
Start
Network Design (27:14)
Start
Wireless Networking (32:29)
Start
Chapter 06 Quiz
Chapter 07 – Managing Server/Host Security
Start
Managing Server/Host Security (1:23)
Start
The Operating Systems Part 1 (20:31)
Start
The Operating Systems Part 2 (14:18)
Start
The Operating Systems Part 3 (15:19)
Start
The Operating Systems Part 4 (9:57)
Start
Hardening the OS (25:48)
Start
Physical Security (28:37)
Start
Chapter 07 Quiz
Chapter 08 – Application Security for Non-Developers
Start
Application Security for Non-Developers (2:34)
Start
Application Security Principles (32:10)
Start
Software Development Life Cycle (18:47)
Start
OWASP Top 10 (16:46)
Start
Hardening Web Applications (8:07)
Start
Patch/Update/Configuration Management (3:41)
Start
Chapter 08 Quiz
Chapter 09 – Understanding Mobile Device Security (IoT)
Start
Understanding Mobile Device Security (IoT) (1:28)
Start
What devices are we talking about? (8:25)
Start
What is the risk? (18:43)
Start
Hardening Mobile/IoT Devices (23:59)
Start
Corporate Management (11:23)
Start
Chapter 09 Quiz
Chapter 10 – Managing Day to Day Security
Start
Managing Day to Day Security (1:18)
Start
Company Responsibilities (35:34)
Start
Product Management (13:20)
Start
Business Continuity Basics Part 1 (14:02)
Start
Business Continuity Basics Part 2 (10:38)
Start
Business Continuity Basics Part 3 (12:56)
Start
Business Continuity Basics Part 4 (11:57)
Start
Business Continuity Basics Part 5 (8:55)
Start
Incident Response (28:57)
Start
Why train? (7:11)
Start
Chapter 10 Quiz
Chapter 11 – Understanding Compliance and Auditing
Start
Understanding Compliance and Auditing (1:17)
Start
Benefits of Compliance (9:41)
Start
Assurance Frameworks (27:47)
Start
What is auditing? (18:31)
Start
Chapter 11 Quiz
Get Integrity Training – Certified Security Principles+ (CSP+) at tenco.pro
Reviews
There are no reviews yet.