Overview
The Secure IT Architect Learning Path includes a variety of security courses designed for those responsible for designing and maintaining computer networks. The curriculum covers best practices for secure software design, creating integrated architecture across business and technology, and protecting data and resources from disclosure, modification, and deletion.
Courses
Overview
The Secure IT Architect Learning Path includes a variety of security courses designed for those responsible for designing and maintaining computer networks. The curriculum covers best practices for secure software design, creating integrated architecture across business and technology, and protecting data and resources from disclosure, modification, and deletion.
Courses
- API 250 – Controlling Access to the Kubernetes API
- COD 252 – Securing Google Platform Applications & Data
- DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
- DES 206 – Meeting Cloud Governance and Compliance Requirements
- DES 207 – Mitigating OWASP API Security Top 10
- DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
- DES 209 – Authentication and Lifecycle Management
- DES 210 – Hardening Linux/Unix Systems
- DES 212 – Architecture Risk Analysis & Remediation
- DES 214 – Securing Infrastructure Architecture
- DES 215 – Defending Infrastructure
- DES 216 – Protecting Cloud Infrastructure
- DES 217 – Securing Terraform Infrastructure and Resources
- DES 218 – Protecting Microservices, Containers, and Orchestration
- DES 255 – Securing the IoT Update Process
- DES 260 – Fundamentals of IoT Architecture & Design
- DES 261 – Securing Serverless Environments
- DSO 211 – Identifying Threats to Containers in a DevSecOps Framework
- DSO 212 – Fundamentals of Zero Trust Security
- DSO 256 – DevSecOps in the Google Cloud Platform
- ENG 211 – How to Create Application Security Design Requirements
- ENG 251 – Risk Management Foundations
Overview
The Secure IT Architect Learning Path includes a variety of security courses designed for those responsible for designing and maintaining computer networks. The curriculum covers best practices for secure software design, creating integrated architecture across business and technology, and protecting data and resources from disclosure, modification, and deletion.
Courses
- CYB 310 – Using Cyber Supply Chain Risk Management (C-SCRM) to Mitigate Threats to IT/OT (NEW)
- CYB 311 – Threat Analysis with AI (NEW)
- DES 313 – Hardening a Kubernetes Cluster
- DES 314 – Hardening the Docker Engine
- DSO 301 – Orchestrating Secure System and Service Configuration
- DSO 304 – Securing API Gateways in a DevSecOps Framework
- DSO 305 – Automating CI/CD Pipeline Compliance
- DSO 306 – Implementing Infrastructure as Code
- ENG 311 – Attack Surface Analysis & Reduction
- ENG 351 – Preparing the Risk Management Framework
- ENG 352 – Categorizing Systems and Information within the RMF
- ENG 353 – Selecting, Implementing and Assessing Controls within the RMF
- ENG 354 – Authorizing and Monitoring System Controls within the RMF
- LAB 312 – ATT&CK: Testing for Network Services Identification (NEW)
- LAB 313 – ATT&CK: Testing for Vulnerability Identification Using Vulnerability Databases (NEW)
- LAB 315 – ATT&CK: Updating Vulnerable Java Web Application Server Software
- LAB 322 – ATT&CK: Exploiting Windows File Sharing Server with External Remote Services
- LAB 323 – ATT&CK: Exploiting Vulnerable Java Web Application Server Software
- LAB 324 – ATT&CK: Exploiting Java Web Application Server Misconfiguration
- TST 303 – Penetration Testing for Google Cloud Platform
- TST 304 – Penetration Testing for AWS Cloud
- TST 305 – Penetration Testing for Azure Cloud
Overview
Learning Path Details
Number of Courses: 41
Number of Labs: 6
Total Duration: 17 hours
Total CPE Credits: 20