Application, Data, and Host Security Scenarios


  5 Hours
  PDF Certificate
CEU: 0.5
CPD: 0.5
PDU: 5
ISC-A: 5

Course Description

Covers the security of applications, data, and hosts in information systems. Provides a comprehensive examination of software development and change management. Features a number of fictional scenarios based on real-world application, data, and host security.


Learning Outcomes

After completing this course, the learner should be able to:

  • Discuss the role of security in software development
  • Explain the software development life cycle and compare its eight stages
  • Understand what the operating system is and how it works
  • Describe different application and operating environments
  • Discuss the role of databases and the information security challenges they raise
  • Understand the various vectors for attack
  • Explain the objectives of Trusted Recovery and the concept of system hardening
  • Recognize the need for physical security and the varying means of achieving it
  • Apply security concepts to real-world scenarios highlighting the need for application, data, and host security

 $89.00