Workforce Education Solutions
Training & Development

Sign In   |   View Cart   |     |   Help
Home  
 
Print Course information
Email to a friend
Return to Course Catalog

Course Catalog > Cybersecurity >

Other Cybersecurity

Application, Data, and Host Security Scenarios  

 Course Description

When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

 Learning Objectives
  • Discuss the role of security in software development
  • Explain the software development life cycle and compare its eight stages
  • Understand what the operating system is and how it works
  • Describe different application and operating environments
  • Discuss the role of databases and the information security challenges they raise
  • Understand the various vectors for attack
  • Explain the objectives of Trusted Recovery and the concept of system hardening
  • Recognize the need for physical security and the varying means of achieving it
  • Apply security concepts to real-world scenarios highlighting the need for application, data, and host security
 Prerequisites

There are no prerequisites.

 Notes

This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.

This course does not require any additional purchases of supplementary materials.

Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEUs. Learners will have three attempts at all graded assessments.

Project Management Institute, PMI, the Registered Education Provider logo, Project Management Professional, PMP, Project Management Body of Knowledge, PMBOK, PMI Agile Certified Practitioner, PMI-ACP, PMI Risk Management Professional, PMI-RMP, the PMI Talent Triangle, and the PMI Talent Triangle logo are marks of the Project Management Institute, Inc.

Information in this course has been taken from A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) — Sixth Edition, Project Management Institute Inc., 2017.

The following list outlines the PDUs you will earn for completing this course, based on the certification you have.

  • PMP®/PgMP®   
    • Technical: 2.5
    • Leadership: 1.5
    • Strategic/Business: 1
    • TOTAL: 5
  • PMI-RMP®   
    • Technical: 2.5
    • Leadership: 1.5
    • Strategic/Business: 1
    • TOTAL: 5
  • PMI-SP®   
    • Technical: 0
    • Leadership: 1.5
    • Strategic/Business: 1
    • TOTAL: 2.5
  • PMI-ACP®   
    • Technical: 2.5
    • Leadership: 1.5
    • Strategic/Business: 1
    • TOTAL: 5
  • PfMP®   
    • Technical: 0
    • Leadership: 1.5
    • Strategic/Business: 1
    • TOTAL: 2.5
  • PMI-PBA®   
    • Technical: 0
    • Leadership: 1.5
    • Strategic/Business: 1
    • TOTAL: 2.5
 Estimated Time of Completion

5 Hours

 Access Time

90 Days

 CEU / PDU Outcomes

0.5 CEUs | 5 HRCIs | 5 PDUs

 

For Additional Information Visit: https://www2.mindedge.com/page/professional/course/1219

 

  • Application, Data, and Host Security Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.