About this Course
Utilizing the knowledge and skills gained in the previous two courses, this final course provides experience in applying concepts and techniques for planning, building and managing secure environments.
What You’ll Learn
- How to build a threat model to identify risks associated with systems or applications
- Cryptography concepts
- How to identify and respond to security incidents
- Risks in cloud environments
- Challenges with securing critical infrastructure and industrial control systems
Get Hands-On Experience
- Practice building a threat model for an organization
- Explore various security tools and technologies related to cryptography, authentication and other class topics