- Level Foundation
- Duration 8 hours
-
Offered by
About
Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and all the tax is data. Therefore, it's so critical, the total set of software powering an organization's business logic and processes must be kept secure. As we'll see in this chapter, the software provides a layered environment. Building from a core or kernel of trustworthy functions up through to the mobile code and executable content. This enables and empowers all web apps and remote data access. Security professionals need to appreciate securing software covers two very different, but closely related major tasks. They need to ensure that the Security Posture of that software is known and understood, as well as ensure the software is installed, maintained, and used in ways consistent with Security Posture or improve it over time. As we discussed in the previous chapter, Security Posture is the set of risks, vulnerabilities controls, and residual risks pertaining to an asset or system. We summarize the safety or risk of using an asset and the degree of reliance that can be placed on the results from a specific context or situation. In this course, we'll build on that foundation by looking more closely at how the data can be the target of an attack and part of exploiting other vulnerabilities in the system. We'll explore what security professionals, as non-programmers, can do to reduce the risk of such malformed input attacks. In course two, we also discussed the non-human user concept as a general way to view management and security of devices and software entities to protect those entities from threats to their integrity and to protect the overall system and individual assets from unauthorized behavior by those non-human users. In this chapter, we'll build on those concepts, as we dive into Endpoint Security Issues and Approaches. Course 4 Learning Objectives After completing this course, the participant will be able to: L4.1 - Discuss software systems and application security. L4.2 - Recognize data security concepts and skills. L4.3 - Identify malicious code and countermeasures. L4.4 - Evaluate mobile device management (MDM) and security issues with mobile and autonomous endpoints. L4.5 - Review attacks and countermeasures for virtual machines. Course Agenda Module 1: Securing Software (Domain 1 - Security Operations and Administration, Domain 3 - Risk Identification, Monitoring and Analysis , Domain 7 - Systems and Application Security ) Module 2: Securing Data (Domain 1 - Security Operations and Administration, Domain 7 - Systems and Application Security ) Module 3: Identify and Analyze Malicious Code and Activity (Domain 7 - Systems and Application Security) Module 4: Implement and Operate Endpoint Security (Domain 7 - Systems and Application Security ) Module 5: Operate and Secure Virtual Environments (Domain 7 - Systems and Application Security , Domain 6 - Network and Communications Security) Who Should Take This Course: Beginners Experience Required: No prior experience requiredAuto Summary
"Securing Software, Data, and End Points" is a foundational course in IT & Computer Science designed to arm security professionals with crucial knowledge and skills for safeguarding organizational assets. Led by expert instructors on Coursera, this course delves into the intricacies of securing software systems, protecting data, and managing endpoint security. The course is structured into five comprehensive modules, each targeting key security domains: 1. **Securing Software** - Explore the layered environment of software security, focusing on risk identification, monitoring, and security operations. 2. **Securing Data** - Understand the concepts and skills necessary for robust data security. 3. **Identifying and Analyzing Malicious Code** - Learn to detect and counteract malicious code effectively. 4. **Implementing and Operating Endpoint Security** - Address security issues related to mobile devices and autonomous endpoints. 5. **Operating and Securing Virtual Environments** - Study the specific security challenges and countermeasures in virtual machine environments. By completing this course, participants will be able to discuss software and application security, recognize data security concepts, identify malicious code, evaluate mobile device management, and review virtual machine security measures. This 480-hour course is ideal for beginners, requiring no prior experience. It offers a flexible subscription option under the Starter plan, making it accessible for anyone looking to build a solid foundation in IT security. Whether you're aspiring to enter the field or enhance your knowledge, this course provides the essential tools and insights to protect software, data, and endpoints effectively. Join now and take the first step towards becoming a proficient security professional!