Course Overview
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
Course Objectives
Upon successful completion of this course, students will be able to:
Identify enterprise security fundamentals.
Apply enterprise security technology solutions.
Implement security design and solutions.
Manage risk, policies and procedures within an enterprise.
Integrate security solutions within an enterprise.
Conduct security research and analysis.
Student Testimonials
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Student
Excellent presentation skills, subject matter knowledge, and command of the environment.
Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Student
Click here to print this page »
Prerequisites
This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience.
Detailed Class Syllabus
1 - Enterprise Security Architecture
The Basics of Enterprise Security
The Enterprise Structure
Enterprise Security Requirements
The Basics of Enterprise Security
The Enterprise Structure
Enterprise Security Requirements
2 - Enterprise Security Technology
Common Network Security Components and Technologies
Communications and Collaboration Security
Cryptographic Tools and Techniques
Advanced Authentication
3 - Enterprise Resource Technology
Enterprise Storage Security Issues
Distributed, Shared, and Virtualized Computing
Cloud Computing and Security
4 - Security Design and Solutions
Network Security Design
Conduct a Security Assessment
Host Security
5 - Application Security Design
Application Security Basics
Web Application Security
6 - Managing Risk, Security Policies, and Security Procedures
Analyze Security Risk
Implement Risk Mitigation Strategies and Controls
Implement Enterprise-Level Security Policies and Procedures
Prepare for Incident Response and Recovery
7 - Enterprise Security Integration
The Technology Life Cycle
Inter-Organizational Change
Integrate Enterprise Disciplines to Achieve Secure Solutions
8 - Security Research and Analysis
Perform an Industry Trends and Impact Analysis
Perform an Enterprise Security Analysis