Introduction
Welcome
()
What you need to know
()
1. Security Design
Legislative and regulatory compliance
()
Frameworks and reference architectures
()
Developing security baselines
()
Leveraging industry standards
()
Customizing security standards
()
Defense in depth
()
Control diversity
()
2. User Training
Security education
()
Information classification
()
Compliance training
()
User habits
()
User-based threats
()
Measuring security education
()
3. Secure Network Design
Security zones
()
Public and private addressing
()
Subnetting
()
VLANs and network segmentation
()
Security device placement
()
Software-defined networking (SDN)
()
Port isolation
()
4. Secure Systems Design
Operating system types
()
Data encryption
()
Hardware and firmware security
()
Peripheral security
()
IT automation
()
Non-persistence
()
5. Secure Staging and Deployment
Software staging and release
()
Software risk assessment and mitigation
()
Secure baselines and integrity measurement
()
6. Embedded System Security
Industrial control systems
()
Internet of Things
()
Securing smart devices
()
Secure networking for smart devices
()
Embedded systems
()
7. Software Development Security
Development methodologies
()
Maturity models
()
Operation, maintenance, and change management
()
DevOps
()
Code repositories
()
Third-party code
()
Code signing
()
Database security controls
()
Software testing
()
Code reviews
()
Code tests
()
Fuzz testing
()
Code Execution
()
8. Cloud Computing and Virtualization
Virtualization
()
Cloud computing models
()
Public cloud tiers
()
Cloud storage security
()
Security service providers
()
Desktop and application virtualization
()
9. Physical Security
Site and facility design
()
Data center environmental controls
()
Data center environmental protection
()
Physical security control types
()
Physical access control
()
Visitor management
()
Hardware physical security
()
Conclusion
What's next?
()