Course

Systems and Application Security

(ISC)²

Welcome to the Systems and Application Security Course! This course delves into the complexities of computer code that can be described as harmful or malicious. It covers a wide range of topics related to both technical and non-technical attacks. Throughout the course, you will learn to identify malicious code activity and gain insights into various countermeasures. Additionally, you will explore the processes for operating endpoint device security, mobile device management, and configuring cloud security. The course also delves into securing big data systems and virtual environments. This comprehensive program will help you understand key concepts and best practices for securing systems and applications.

  • Gain a deep understanding of malicious code and its countermeasures
  • Learn about endpoint device security and mobile device management processes
  • Understand the process for configuring cloud security and securing big data systems
  • Explore the techniques for securing virtual environments

Certificate Available ✔

Get Started / More Info
Systems and Application Security
Course Modules

The Systems and Application Security Course modules cover a wide array of topics, including identifying and analyzing malicious code, implementing endpoint device security, operating and configuring cloud security, securing big data systems, and a comprehensive case study and end-of-course assessment.

Identify and Analyze Malicious Code and Activity

Identify and Analyze Malicious Code and Activity: This module provides an in-depth understanding of malicious code and its countermeasures. It covers software exploitation methods, code signing, social engineering, and security awareness training. Students will also gain insights into malicious web activity and zero-day exploits.

Implement and Operate Endpoint Device Security

Implement and Operate Endpoint Device Security: This module focuses on endpoint device security, including HIDS, Trusted Platform Module (TPM), and BYOD policy considerations. Students will explore the best practices for securing endpoint devices and mitigating potential security risks.

Operate and Configure Cloud Security

Operate and Configure Cloud Security: This module delves into the essential characteristics of clouds, hybrid cloud security, virtualization, hypervisor, and legal considerations. Students will learn about technologies to address cloud security threats and the application of defined controls for personally identifiable information (PII).

Secure Big Data Systems & Operate and Secure Virtual Environments

Secure Big Data Systems & Operate and Secure Virtual Environments: This module covers the complexities of secure big data systems, including interpreting big data and addressing key challenges. It also explores secure virtual environments, SDN, virtual appliances, DRS, common attacks, network security, and virtual machine security.

Case Study

Case Study: This module provides a comprehensive case study to apply the knowledge gained throughout the course. It offers practical insights and real-world scenarios to reinforce the understanding of systems and application security.

End-of-Course Assessment

End-of-Course Assessment: In this module, students will undergo an assessment to evaluate their understanding of the course material. It aims to ensure that students have acquired the knowledge and skills necessary to address security challenges in systems and applications effectively.

More Security Courses

Cybersecurity Risk Management Frameworks

University System of Georgia

Explore Cybersecurity Risk Management Frameworks and learn to define cybersecurity risk, discuss threats, and understand risk management frameworks and standards....

C++ Superpowers and More

Infosec

Explore the power and intricacies of C and C++ languages in this comprehensive course. Gain insights into security, external interactions, error handling, and more....

Introduction to the Threat Intelligence Lifecycle

IBM

Introduction to the Threat Intelligence Lifecycle provides comprehensive understanding of threat intelligence phases and techniques to mitigate potential attacks...

Introduction to Cybersecurity Fundamentals

Coursera Instructor Network

Embark on a comprehensive journey into the world of cybersecurity with the "Introduction to Cybersecurity Fundamentals" course. Gain essential knowledge...