O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Security Principles+ (CSP+)

Video Description

This course will introduce students to IT security, as well as teach them about risk management, understanding of cryptography, understanding identity and access management, managing data security, managing network security, managing server/host security, application security for non-developers, understanding mobile device security (IoT), managing day to day security, and understanding compliance and auditing. This course begins with an introduction to IT security, and proceeds to a discussion of risk management in terms of risks and vulnerabilities, cryptography in terms of encryption algorithms and usage, identity and access management including authorization and monitoring, managing data security, managing network security, managing server/host security and application security for non-developers. Mobile device security is covered with reference to the Internet of Things (IoT). The course concludes with a discussion of managing day to day security and understanding compliance and auditing.

Table of Contents

  1. Introduction
    1. Course Introduction 00:15:55
  2. Chapter 01 - Introduction to IT Security
    1. Introduction to IT Security 00:00:55
    2. Understanding Security 00:26:14
    3. Responsibilities 00:22:34
    4. Building a Security Program 00:27:51
    5. CIA Triad 00:10:13
    6. Governance, Risk, Compliance 00:17:52
    7. State of Security Today 00:10:58
  3. Chapter 02 - Risk Management
    1. Risk Management Introduction 00:01:08
    2. Risk Management 00:19:05
    3. Risk Assessment 00:16:17
    4. Types of Risk, Threats and Vulnerabilities 00:29:30
    5. Mitigating Attacks 00:24:41
    6. Discovering Vulnerabilities and Threats Part1 00:17:36
    7. Discovering Vulnerabilities and Threats Part2 00:14:25
    8. Discovering Vulnerabilities and Threats Part3 00:17:56
    9. Discovering Vulnerabilities and Threats Part4 00:13:24
    10. Responding to Risk 00:09:59
  4. Chapter 03 - Understanding of Cryptography
    1. Understanding of Cryptography 00:01:45
    2. Understanding Cryptography 00:08:35
    3. Symmetric Encryption 00:28:55
    4. Asymmetric Encryption 00:17:37
    5. Hashing 00:13:32
    6. PKI 00:10:31
    7. Cryptography in Use 00:14:00
  5. Chapter 04 - Understanding Identity and Access Management
    1. Understanding Identity and Access Management 00:00:21
    2. Identity Management 00:14:27
    3. Authentication Techniques 00:17:28
    4. Single Sign-on 00:28:22
    5. Access Control Monitoring 00:11:28
  6. Chapter 05 - Managing Data Security
    1. Managing Data Security 00:00:51
    2. Different Types of Storage 00:33:35
    3. Encryption Options 00:13:11
    4. Data Management 00:29:24
  7. Chapter 06 - Managing Network Security
    1. Managing Network Security 00:01:39
    2. Protocols and Services 00:28:30
    3. Network and Security Devices Part1 00:20:32
    4. Network and Security Devices Part2 00:22:17
    5. Network Design 00:27:14
    6. Wireless Networking 00:32:30
  8. Chapter 07 - Managing Server/Host Security
    1. Managing Server/Host Security 00:01:23
    2. Section 1 - The Operating Systems Part1 00:20:31
    3. The Operating Systems Part2 00:14:19
    4. The Operating Systems Part3 00:15:20
    5. The Operating Systems Part4 00:09:57
    6. Section 2 - Hardening the OS 00:25:48
    7. Section 3 - Physical Security 00:28:38
  9. Chapter 08 - Application Security for Non-Developers
    1. Application Security for Non-Developers 00:02:35
    2. Application Security Principles 00:32:11
    3. Software Development Life Cycle 00:18:47
    4. OWASP Top 10 00:16:46
    5. Hardening Web Applications 00:08:08
    6. Patch/Update/Configuration Management 00:03:41
  10. Chapter 09 - Understanding Mobile Device Security (IoT)
    1. Understanding Mobile Device Security (IoT) 00:01:28
    2. What devices are we talking about? 00:08:26
    3. What is the risk? 00:18:44
    4. Hardening Mobile/IoT Devices 00:23:59
    5. Corporate Management 00:11:23
  11. Chapter 10 - Managing Day to Day Security
    1. Managing Day to Day Security 00:01:18
    2. Company Responsibilities 00:35:34
    3. Product Management 00:13:20
    4. Business Continuity Basics Part1 00:14:02
    5. Business Continuity Basics Part2 00:10:39
    6. Business Continuity Basics Part3 00:12:57
    7. Business Continuity Basics Part4 00:11:57
    8. Business Continuity Basics Part5 00:08:55
    9. Incident Response 00:28:57
    10. Why train? 00:07:12
  12. Chapter 11 - Understanding Compliance and Auditing
    1. Understanding Compliance and Auditing 00:01:17
    2. Benefits of Compliance 00:09:41
    3. Assurance Frameworks 00:27:47
    4. What is auditing? 00:18:32