CISSP 2021: Secure Design Principles

CISSP    |    Expert
  • 11 videos | 40m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 212 users Rating 4.6 of 212 users (212)
Security design principles are crucial while designing any security mechanism for a system. This course will help you gain a better understanding of how these principles help develop a secure system, which prevents security flaws and also blocks unwanted access to it. Get familiar with security concepts and principles such as defense in depth, least privilege, and zero trust and explore them further with the help of real-world applications and use cases. After completing this course, you'll be aware of the significance of methodologies for implementing separation of duties, secure defaults, secure failure, and privacy by design while avoiding over-complexity.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the security principle of least privilege and provide real-world examples
    Describe the security principle of defense in depth (did) and provide real-world examples
    Describe the security principle of separation of duties (sod) and provide real-world examples
    Describe what it means to "keep it simple" in the context of a security principle with real-world examples
    Define the characteristics of the zero trust (zt) principle and zero trust architecture (zta)
  • Outline the design principles and use cases of secure defaults
    Recognize the characteristics of secure failure and differentiate between fail open and fail closed firewalls
    Describe the security principle of privacy by design and provide real-world examples
    List use cases for the trust but verify security principle
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 37s
    This course introduces you to secure design principles that will help you design any security mechanism for a system. Learn to prevent security flaws and block unwanted access. Study security concepts and principles, such as defense in depth, least privilege, and zero trust. FREE ACCESS
  • 4m 49s
    In this video, we examine the security principle of least privilege and provide real-world examples. Learn about Authentication Authorization Accounting (AAA), Identity and Access Management (IAM), and hypervisors. FREE ACCESS
  • Locked
    3.  Defense in Depth (DiD) Principle
    7m 34s
    This video examines the security principle of Defense in Depth (DiD), and provides real-world examples. Learn about supply chain risk management, de-perimeterization, monitoring and response operations, prevention, policy management, and endpoint security. FREE ACCESS
  • Locked
    4.  Separation of Duties (SoD) Principle
    6m 51s
    This video explores the security principle of separation of duties (SoD) and provides real-world examples. Review separation of duties in Agile, Spiral. and CI/CD development. Consider dual operator principles, rotation of duties, and other security strategies. FREE ACCESS
  • Locked
    5.  Keeping It Simple
    3m 4s
    In this video, we see what it means to "keep it simple" in the context of a security principle with real-world examples. Learn how to find the delicate balance between security and protecting data, applications, and systems, while still maintaining user productivity. FREE ACCESS
  • Locked
    6.  Zero Trust
    4m 44s
    In this video, we define the characteristics of the Zero Trust (ZT) principle and of zero trust architecture (ZTA). We examine ZT from a management standpoint, a security management perspective, and an information security administration point of view. FREE ACCESS
  • Locked
    7.  Secure Defaults
    3m 3s
    In this video, we examine secure design principles and use cases of secure defaults. We compare the strategies of security by design, security by deployment, security by default, and security through obscurity. FREE ACCESS
  • Locked
    8.  Fail Securely
    2m 46s
    In this video, we review the characteristics of secure failure, and differentiate between fail open and fail closed systems, such as firewalls or other appliances. We then compare the benefits and risks of both security approaches. FREE ACCESS
  • Locked
    9.  Privacy by Design Principle
    3m 37s
    In this video, we look at the security principle of privacy by design, and provide real-world examples. We will use the NIST Privacy Framework as our prototype. The NIST Privacy Framework is a tool to improve privacy through Enterprise Risk Management. FREE ACCESS
  • Locked
    10.  Trust but Verify Principle
    1m 35s
    In this video, we list use cases for the Trust but Verify security principle. Trust but Verify is not a "zero trust" approach to security, however, it does introduce stronger identification mechanisms, such as multi-factor authentication (MFA). FREE ACCESS
  • Locked
    11.  Course Summary
    44s
    In this course, we examined secure design principles that are useful to any security mechanism for a system. We observed how to prevent security flaws and block unwanted access. We discussed security concepts and principles, such as defense in depth, least privilege, and zero trust. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 116 users Rating 4.5 of 116 users (116)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 292 users Rating 4.5 of 292 users (292)
Rating 4.2 of 69 users Rating 4.2 of 69 users (69)
Rating 4.5 of 62 users Rating 4.5 of 62 users (62)