Systems and Application Security

  • 4.8
Approx. 17 hours to complete

Course Summary

Learn how to secure various systems and applications through this course. Gain knowledge on security policies, risk management, and disaster recovery.

Key Learning Points

  • Understand the fundamentals of security policies and risk management
  • Learn how to secure different types of systems and applications
  • Develop skills in disaster recovery and business continuity planning

Related Topics for further study


Learning Outcomes

  • Create security policies for different types of systems and applications
  • Perform risk assessments and implement risk management strategies
  • Develop disaster recovery and business continuity plans

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer systems and networks
  • Familiarity with security concepts

Course Difficulty Level

Intermediate

Course Format

  • Self-paced
  • Online
  • Video-based

Similar Courses

  • Cybersecurity Fundamentals
  • Introduction to Cybersecurity

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Troy Hunt

Related Books

Description

Welcome to Systems and Application Security Course!

Outline

  • Identify and Analyze Malicious Code and Activity
  • Systems and Application Security
  • Malicious Code and Activity: Key Concepts
  • Malicious Code and Activity: Malicious Code Countermeasures
  • Malicious Code and Activity: Software Exploitation Methods
  • Malicious Code and Activity: Software Exploitation Methods
  • Malicious Code and Activity: Code Signing
  • Malicious Code and Activity: Social Engineering
  • Malicious Code and Activity: Security Awareness Training
  • Malicious Code and Activity: Long File Extensions
  • Malicious Code and Activity: E-mail
  • Malicious Code and Activity: Countermeasures
  • Malicious Code and Activity: Examples of Spoofing
  • Malicious Code and Activity: Techniques
  • Malicious Code and Activity: Botnet-Led Exploits
  • Malicious Code and Activity: Malicious Web Activity
  • Malicious Code and Activity: Zero-Day Exploits
  • Malicious Code and Activity: Infected Factory Builds and Media
  • Malicious Code and Activity: Inspection of Processes
  • Systems and Application Security
  • Malicious Code and Activity: Key Concepts
  • Malicious Code and Activity: Malicious Code Countermeasures
  • Malicious Code and Activity: Software Exploitation Methods
  • Malicious Code and Activity: Software Exploitation Methods
  • Malicious Code and Activity: Code Signing
  • Malicious Code and Activity: Social Engineering
  • Malicious Code and Activity: Security Awareness Training
  • Malicious Code and Activity: Long File Extensions
  • Malicious Code and Activity: E-mail
  • Malicious Code and Activity: Countermeasures
  • Malicious Code and Activity: Examples of Spoofing
  • Malicious Code and Activity: Techniques
  • Malicious Code and Activity: Botnet-Led Exploits
  • Malicious Code and Activity: Malicious Web Activity
  • Malicious Code and Activity: Zero-Day Exploits
  • Malicious Code and Activity: Infected Factory Builds and Media
  • Malicious Code and Activity: Inspection of Processes
  • Quiz 1
  • Implement and Operate Endpoint Device Security
  • Endpoint Device Security: HIDS
  • Endpoint Device Security: Trusted Platform Module (TPM)
  • Endpoint Device Security: BYOD Policy Considerations
  • Endpoint Device Security: HIDS
  • Endpoint Device Security: Trusted Platform Module (TPM)
  • Endpoint Device Security: BYOD Policy Considerations
  • Quiz 2
  • Operate and Configure Cloud Security
  • Cloud Security: Five Essential Characteristics of Clouds
  • Cloud Security: Hybrid
  • Cloud Security: Virtualization
  • Cloud Security: Hypervisor
  • Cloud Security: Country-Specific Legal Considerations
  • Cloud Security: P&DP Laws
  • Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)
  • Cloud Security: Data Dispersion
  • Cloud Security: Threat to Storage Types
  • Cloud Security: Technologies to Address Threats
  • Cloud Security: DLP Architecture
  • Cloud Security: Review Activity
  • Cloud Security: Key Storage in the Cloud
  • Cloud Security: Common Approaches for Data Masking
  • Cloud Security: Data Retention Policies
  • Cloud Security: Disposal Options
  • Cloud Security: Five Essential Characteristics of Clouds
  • Cloud Security: Hybrid
  • Cloud Security: Virtualization
  • Cloud Security: Hypervisor
  • Cloud Security: Country-Specific Legal Considerations
  • Cloud Security: P&DP Laws
  • Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)
  • Cloud Security: Data Dispersion
  • Cloud Security: Threat to Storage Types
  • Cloud Security: Technologies to Address Threats
  • Cloud Security: DLP Architecture
  • Cloud Security: Review Activity
  • Cloud Security: Key Storage in the Cloud
  • Cloud Security: Common Approaches for Data Masking
  • Cloud Security: Data Retention Policies
  • Cloud Security: Disposal Options
  • Quiz 3
  • Secure Big Data Systems & Operate and Secure Virtual Environments
  • Secure Big data Systems: Big Data
  • Secure Big Data Systems: Interpreting Big Data
  • Secure Big data Systems: Key Challenges
  • Operate and Secure Virtual Environments: SDN
  • Operate and Secure Virtual Environments: Virtual Appliances
  • Operate and Secure Virtual Environments: DRS
  • Operate and Secure Virtual Environments: Common Attacks
  • Operate and Secure Virtual Environments: Network Security
  • Operate and Secure Virtual Environments: Virtual Machine Security
  • Secure Big Data Systems: Big Data
  • Secure Big Data Systems: Interpreting Big Data
  • Secure Big data Systems: Key Challenges
  • Operate and Secure Virtual Environments: SDN
  • Operate and Secure Virtual Environments: Virtual Appliances
  • Operate and Secure Virtual Environments: DRS
  • Operate and Secure Virtual Environments: Common Attacks
  • Operate and Secure Virtual Environments: Network Security
  • Operate and Secure Virtual Environments: Virtual Machine Security
  • Quiz 4
  • Case Study
  • End-of-Course Assessment
  • Final Quiz

Summary of User Reviews

The Systems Application Security SSCP course on Coursera has received positive reviews from users. Many have found the course to be informative and engaging, with practical applications for real-world scenarios.

Key Aspect Users Liked About This Course

Practical applications for real-world scenarios

Pros from User Reviews

  • Well-structured and easy to follow
  • In-depth coverage of security concepts and best practices
  • Engaging and knowledgeable instructors
  • Practical assignments that reinforce learning
  • Good mix of theory and hands-on exercises

Cons from User Reviews

  • Course material can be dense and technical
  • Some users found the pace of the course to be too slow
  • Limited interaction with instructors and peers
  • Lack of focus on specific technologies or tools
  • Price may be high for some learners
English
Available now
Approx. 17 hours to complete
(ISC)² Education & Training
(ISC)²
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses