Overview
The IT Architect learning path includes a variety of security courses that will vary depending on whether you are seeking core, advanced or elite paths. It is designed for those responsible for designing and maintaining computer networks.
Concepts covered include:
- Best practices for secure software design
- Creating integrated architecture across business and technology
- Protecting data and resources from disclosure, modification, and deletion
- API 250 – Controlling Access to the Kubernetes API (NEW)
- COD 252 – Securing Google Platform Applications & Data
- DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
- DES 206 – Meeting Cloud Governance and Compliance Requirements
- DES 207 – Mitigating OWASP API Security Top 10
- DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
- DES 209 – Authentication and Lifecycle Management
- DES 210 – Hardening Linux/Unix Systems
- DES 212 – Architecture Risk Analysis & Remediation
- DES 214 – Securing Infrastructure Architecture (UPDATED)
- DES 215 – Defending Infrastructure (UPDATED)
- DES 216 – Protecting Cloud Infrastructure (UPDATED)
- DES 217 – Securing Terraform Infrastructure and Resources
- DES 218 – Protecting Microservices, Containers, and Orchestration (UPDATED)
- DES 255 – Securing the IoT Update Process
- DES 260 – Fundamentals of IoT Architecture & Design
- DSO 211 – Identifying Threats to Containers in a DevSecOps Framework
- DSO 256 – DevSecOps in the Google Cloud Platform
- ENG 211 – How to Create Application Security Design Requirements
- ENG 251 – Risk Management Foundations
- DES 313 – Hardening a Kubernetes Cluster
- DES 314 – Hardening the Docker Engine
- DSO 301 – Orchestrating Secure System and Service Configuration
- DSO 304 – Securing API Gateways in a DevSecOps Framework
- DSO 305 – Automating CI/CD Pipeline Compliance
- DSO 306 – Implementing Infrastructure as Code
- ENG 311 – Attack Surface Analysis & Reduction
- ENG 351 – Preparing the Risk Management Framework
- ENG 352 – Categorizing Systems and Information within the RMF
- ENG 353 – Selecting, Implementing and Assessing Controls within the RMF
- ENG 354 – Authorizing and Monitoring System Controls within the RMF
- LAB 315 ATT&CK: Updating Vulnerable Java Web Application Server Software
- LAB 322 ATT&CK: Exploiting Windows File Sharing Server with External Remote Services
- LAB 323 ATT&CK: Exploiting Vulnerable Java Web Application Server Software
- LAB 324 ATT&CK: Exploiting Java Web Application Server Misconfiguration
- TST 303 – Penetration Testing for Google Cloud Platform
- TST 304 – Penetration Testing for AWS Cloud
- TST 305 – Penetration Testing for Azure Cloud
Learning Path Details
Number of Courses: 41
Number of Labs: 4
Total Duration: 15 hours
Total CPE Credits: 18