Create your own
teaching resources

Sign up for a free account to try! It takes less than 20 seconds

Teacherbot 22 Jan, 08:47:34

Introduction Secure system design and implementation is essential for any organization seeking to protect itself from cyber threats. This training program will provide direction to cyber security engineers on the concept of zero trust architecture, system design and security configuration, along with insights into vulnerabilities and exploits. Participants in the course will establish a strong foundation for risk management, Defense in Depth (DiD) and secure software development life cycles.

Program Objectives • Analyze the concept, strategies and tradeoffs of Zero Trust Architecture. • Describe system and network hardening, security architecture and secure network engineering. • Discuss secure configuration management and protocols. • Recognize the different types of vulnerabilities and mitigate the risk of exploits.

Module Outline

Module 1: Zero Trust Architecture • Introduction to Zero Trust Architecture • Zero Trust Architecture framework • Advanced Context-aware security with Zero Trust • Case studies

Module 2: System Design • System architecture fundamentals • Network security design • Creating a secure perimeter • Role-based networks

Module 3: Secure Configuration • System configuration basics • Best practices for hardware and software configuration • Security protocols • Establishing secure asset management

Module 4: Vulnerabilities and Exploits • Overview of vulnerabilities • Exploitation techniques • Patching, Honeypots, and the impact on system design

References • Zero Trust Principles, Forrester Report, 2017 • System and Network Security Architecture, UpGuard, 2019 • Secure Configuration Management and Compliance, UpGuard, 2019 • Host-Based Firewall Security, US-CERT, 2018 • Vulnerabilities: Types, Examples and Mitigation Techniques, Cenzic, 2017