Overview
The Secure Systems Administrator Learning Path includes a variety of security courses designed for those responsible for preventing and mitigating security breaches that may arise within computer systems. The curriculum provides a holistic approach to network and system security with an exploration of controls, monitoring access, operational procedure, and formal auditing and logging.
Courses
- AWA 101 – Fundamentals of Application Security
- AWA 102 – Secure Software Concepts
- COD 141 – Fundamentals of Database Security
- DES 151 – Fundamentals of the PCI Secure SLC Standard
- ENG 110 – Essential Account Management Security
- ENG 111 – Essential Session Management Security
- ENG 113 – Essential Secure Configuration Management
- ENG 118 – Essential Incident Response
- ENG 119 – Essential Security Audit & Accountability
- ENG 121 – Essential Identification & Authentication
- ENG 122 – Essential Physical & Environmental Protection
- ENG 123 – Essential Security Engineering Principles
- ENG 125 – Essential Data Protection
- ENG 127 – Essential Media Protection
- ENG 150 – Meeting Confidentiality, Integrity, and Availability Requirements
- ENG 151 – Fundamentals of Privacy Protection
Overview
The Secure Systems Administrator Learning Path includes a variety of security courses designed for those responsible for preventing and mitigating security breaches that may arise within computer systems. The curriculum provides a holistic approach to network and system security with an exploration of controls, monitoring access, operational procedure, and formal auditing and logging.
Courses
- API 210 – Mitigating APIs Lack of Resources & Rate Limiting
- API 211 – Mitigating APIs Broken Object Level Authorization
- API 213 – Mitigating APIs Mass Assignment
- API 214 – Mitigating APIs Improper Asset Management
- COD 219 – Creating Secure Code SAP ABAP Foundations
- COD 252 – Securing Google Platform Applications & Data
- COD 261 – Threats to Scripts
- COD 262 – Fundamentals of Shell and Interpreted Language Security
- COD 263 – Secure Bash Scripting
- COD 264 – Secure Perl Scripting
- COD 265 – Secure Python Scripting
- COD 266 – Secure Ruby Scripting
- CYB 210 – Cybersecurity Incident Response
- CYB 250 – Cyber Threat Hunting: Tactics, Techniques, and Procedures (TTP)
- DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
- DES 209 – Authentication and Lifecycle Management
- DES 210 – Hardening Linux/Unix Systems
- DES 214 – Securing Infrastructure Architecture
- DES 215 – Defending Infrastructure
- DES 216 – Protecting Cloud Infrastructure
- DES 217 – Securing Terraform Infrastructure and Resources
- DES 218 – Protecting Microservices, Containers, and Orchestration
- DES 219 – Securing Google’s Firebase Platform
- DES 232 – Mitigating OWASP 2021 Injection
- DES 233 – Mitigating OWASP 2021 Identification and Authentication Failures
- DES 234 – Mitigating OWASP 2021 Cryptographic Failures
- DES 235 – Mitigating OWASP 2021 Insecure Design
- DES 236 – Mitigating OWASP 2021 Broken Access Control
- DES 237 – Mitigating OWASP 2021 Security Misconfiguration
- DES 238 – Mitigating OWASP 2021 Server-Side Request Forgery (SSRF)
- DES 239 – Mitigating OWASP 2021 Software and Data Integrity Failures
- DES 240 – Mitigating OWASP 2021 Vulnerable and Outdated Components
- DES 241 – Mitigating OWASP 2021 Security Logging and Monitoring Failures
- DES 262 – Securing Enterprise Low-Code Application Platforms
- DSO 201 – Fundamentals of Secure DevOps
- DSO 211 – Identifying Threats to Containers and Data in a DevSecOps Framework
- DSO 212 – Fundamentals of Zero Trust Security
- DSO 256 – DevSecOps in the Google Cloud Platform
- ENG 205 – Fundamentals of Threat Modeling
Overview
The Secure Systems Administrator Learning Path includes a variety of security courses designed for those responsible for preventing and mitigating security breaches that may arise within computer systems. The curriculum provides a holistic approach to network and system security with an exploration of controls, monitoring access, operational procedure, and formal auditing and logging.
Courses
- CYB 310 – Using Cyber Supply Chain Risk Management(C-SCRM) to Mitigate Threats to IT/OT
- DSO 301 – Orchestrating Secure System and Service Configuration
- DSO 303 – Automating Security Updates
- DSO 304 – Securing API Gateways in a DevSecOps Framework
- DSO 305 – Automating CI/CD Pipeline Compliance
- ENG 320 – Using Software Composition Analysis (SCA) to Secure Open-Source Components
- TST 303 – Penetration Testing for Google Cloud Platform
- TST 304 – Penetration Testing for AWS Cloud
- TST 305 – Penetration Testing for Azure Cloud
Overview
Learning paths may include elective course content that is not required to complete SI-CSC certification exams successfully. These additional courses are suggested based on alignment with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. To understand how courses map to this framework, please contact us.
Courses
- COD 287 – Java Application Server Hardening
- COD 288 – Java Public Key Cryptography
- COD 383 – Protecting Java Backend Services
Learning Path Details
Number of Courses: 64
Total Duration: 23 hours
Total CPE Credits: 27