Systems Engineering Culture: Cybersecurity

Systems Engineering    |    Intermediate
  • 18 videos | 1h 46m 52s
  • Includes Assessment
  • Earns a Badge
Building an organizational-level systems engineering culture enables organizations to tackle the challenges posed by complex systems, enhance collaboration and communication, mitigate risks, align with industry standards, and drive continuous improvement. In this course, you'll explore systems engineering for cybersecurity and software intensive systems, beginning with security and systems engineering, system safety, system hardware assurance, system design and threat modeling, risk planning and identification, and secure coding practices. Then, you'll learn about software security testing, secure software verification and validation standards, compliance, DevSecOps, and secure continuous integration/continuous delivery (CI/CD). Finally, you'll dig into cloud security, virtualization security, cybersecurity trends, cybersecurity case studies, and analyzing software security vulnerabilities.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline key considerations for security in systems engineering
    Provide an overview of key system safety considerations
    Recognize the various aspects of system hardware assurance
    Identify aspects of threat modeling and how it can be used to enhance cybersecurity in systems engineering
    Recognize the importance of risk assessment in system engineering strategies
    Outline secure coding practices and why they are important
    Provide an overview of software security testing and various best practices
    Identify the principles surrounding secure software integration and verification
  • Recognize standards and compliance considerations in secure systems engineering
    Provide an overview of devsecops practices and why they are important to systems engineering
    Provide an overview of secure continuous integration/continuous delivery (ci/cd) pipelines
    Identify security principles of the cloud and outline how it is used to protect systems
    Identify security principles of virtualization and outline how it is used to protect systems
    Provide an overview of emerging trends in cybersecurity
    Outline real-world case studies of successful cybersecurity implementations in software engineering projects
    Outline a scenario analyzing a software system's security vulnerabilities, propose and implement security controls, and validate the effectiveness of security measures
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 18s
    After completing this video, you will be able to outline key considerations for security in systems engineering. FREE ACCESS
  • Locked
    3.  System Safety
    5m 40s
    Upon completion of this video, you will be able to provide an overview of key system safety considerations. FREE ACCESS
  • Locked
    4.  System Hardware Assurance
    6m 16s
    After completing this video, you will be able to recognize the various aspects of system hardware assurance. FREE ACCESS
  • Locked
    5.  System Design and Threat Modeling
    6m 3s
    Upon completion of this video, you will be able to identify aspects of threat modeling and how it can be used to enhance cybersecurity in systems engineering. FREE ACCESS
  • Locked
    6.  Risk Planning and Identification
    6m 49s
    After completing this video, you will be able to recognize the importance of risk assessment in system engineering strategies. FREE ACCESS
  • Locked
    7.  Secure Coding Practices
    6m 18s
    Upon completion of this video, you will be able to outline secure coding practices and why they are important. FREE ACCESS
  • Locked
    8.  Software Security Testing
    8m 11s
    After completing this video, you will be able to provide an overview of software security testing and various best practices. FREE ACCESS
  • Locked
    9.  Secure Software Verification and Validation
    6m 8s
    Upon completion of this video, you will be able to identify the principles surrounding secure software integration and verification. FREE ACCESS
  • Locked
    10.  Standards and Compliance
    7m 24s
    After completing this video, you will be able to recognize standards and compliance considerations in secure systems engineering. FREE ACCESS
  • Locked
    11.  DevSecOps
    7m 36s
    Upon completion of this video, you will be able to provide an overview of DevSecOps practices and why they are important to systems engineering. FREE ACCESS
  • Locked
    12.  Secure Continuous Integration/Continuous Delivery (CI/CD)
    6m 35s
    After completing this video, you will be able to provide an overview of secure continuous integration/continuous delivery (CI/CD) pipelines. FREE ACCESS
  • Locked
    13.  Cloud Security
    6m 57s
    Upon completion of this video, you will be able to identify security principles of the cloud and outline how it is used to protect systems. FREE ACCESS
  • Locked
    14.  Virtualization Security
    5m 54s
    After completing this video, you will be able to identify security principles of virtualization and outline how it is used to protect systems. FREE ACCESS
  • Locked
    15.  Cybersecurity Trends
    5m 55s
    Upon completion of this video, you will be able to provide an overview of emerging trends in cybersecurity. FREE ACCESS
  • Locked
    16.  Cybersecurity Case Studies
    4m 55s
    After completing this video, you will be able to outline real-world case studies of successful cybersecurity implementations in software engineering projects. FREE ACCESS
  • Locked
    17.  Analyzing Software Security Vulnerabilities
    5m 48s
    In this video, we will outline a scenario analyzing a software system's security vulnerabilities, propose and implement security controls, and validate the effectiveness of security measures. FREE ACCESS
  • Locked
    18.  Course Summary
    55s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.7 of 26 users Rating 4.7 of 26 users (26)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)