- Module 1: The Threat Landscape and Goals of Security Engineering
- Lesson 1: General Principles
- Lesson 2: Physical Attacks
- Lesson 3: Network Infrastructure Attacks
- Lesson 4: System and Application Attacks
- Lesson 5: User Attacks
- Module 2: Overview of Security Controls
- Lesson 1: Organizational Controls
- Lesson 2: Types of Controls
- Lesson 3: Security Engineering Principles
- Lesson 4: Distribution of Controls Between Network and Endpoints
- Lesson 5: Cryptographic Services
- Lesson 6: Authentication and Identity Management
- Lesson 7: Network Controls
- Lesson 8: System Controls
- Lesson 9: Application Controls
- Module 3: Network Infrastructure Protection Solutions
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 4: Enterprise Internet Access Solutions
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 5: Solutions for Exposed Enterprise Services and Data Centers
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 6: Unified Communications Protection Solutions
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 7: Secure WAN Solutions
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 8: Secure Remote Access Solutions
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 9: Enterprise Wireless Security Solutions
- Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
- Module 10: Enterprise Security Management Solutions
- Lesson 1: Overview of Specific Customer Requirements
- Lesson 2: Architectures and Design Guidelines
- Lesson 3: Case Studies
|