Leadership Development
Technology & Data Science
Computer Applications
Cybersecurity & CISSP
Data Management & Analytics
Emerging Technologies
Web Design
Project Management
Organizational Effectiveness
Essential Business Functions
Innovation & Entrepreneurship
Personal Development
Teaching & Learning
Events & Community
Application, Data, and Host Security Scenarios
Course Description
Covers the security of applications, data, and hosts in information systems. Provides a comprehensive examination of software development and change management. Features a number of fictional scenarios based on real-world application, data, and host security.
Learning Outcomes
After completing this course, the learner should be able to:
- Discuss the role of security in software development
- Explain the software development life cycle and compare its eight stages
- Understand what the operating system is and how it works
- Describe different application and operating environments
- Discuss the role of databases and the information security challenges they raise
- Understand the various vectors for attack
- Explain the objectives of Trusted Recovery and the concept of system hardening
- Recognize the need for physical security and the varying means of achieving it
- Apply security concepts to real-world scenarios highlighting the need for application, data, and host security