Course Overview:
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
Course Objectives:
- Identify enterprise security fundamentals.
- Apply enterprise security technology solutions.
- Implement security design and solutions.
- Manage risk, policies and procedures within an enterprise.
- Integrate security solutions within an enterprise.
- Conduct security research and analysis.
Who Should Attend?
This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience.
Course Prerequisites
There are no prerequisites for this course.
Course Content:
Module 1 – Enterprise Security Architecture
The Basics of Enterprise Security
The Enterprise Structure
Enterprise Security Requirements
Module 2 – Enterprise Security Technology
Common Network Security Components and Technologies
Communications and Collaboration Security
Cryptographic Tools and Techniques
Advanced Authentication
Module 3 – Enterprise Resource Technology
Enterprise Storage Security Issues
Distributed, Shared, and Virtualized Computing
Cloud Computing and Security
Module 4 – Security Design and Solutions
Network Security Design
Conduct a Security Assessment
Host Security
Module 5 – Application Security Design
Application Security Basics
Web Application Security
Module 6 – Managing Risk, Security Policies, and Security Procedures
Analyze Security Risk
Implement Risk Mitigation Strategies and Controls
Implement Enterprise-Level Security Policies and Procedures
Prepare for Incident Response and Recovery
Module 7 – Enterprise Security Integration
The Technology Life Cycle
Inter-Organizational Change
Integrate Enterprise Disciplines to Achieve Secure Solutions
Module 8 – Security Research and Analysis
Perform an Industry Trends and Impact Analysis
Perform an Enterprise Security Analysis