Claim your FREE 7-day trial

Learn Security Engineering

The Security Engineering skill path teaches you concepts related to security architecture and engineering, including technical integration of enterprise security, security design and implementation, secure maintenance and disposal, and more.

31 courses  //   130 videos  //   21 hours of training

Security Engineering training

This learning path provides a comprehensive, deep-dive into the world of security engineering. Thirty-one courses build your knowledge and skills around everything from securing storage and devices to implementing and maintaining systems to managing risk and vulnerabilities. You’ll also learn about secure software development, the importance of disaster recovery and continuity planning, and a variety of technical security controls. Upon completion, you’ll have a thorough understanding of security engineering best practices, processes and techniques that you can to carry over to your next role or project.

Learning path components

Stakeholder Requirements Definition
Course
Stakeholder Requirements Definition

Stakeholder Requirements Definition

Review how different stakeholders impact security planning, design and implementation.

2 videos
29 minutes of training

Software Vulnerabilities and Security Controls
Course
Software Vulnerabilities and Security Controls

Software Vulnerabilities and Security Controls

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

4 videos
37 minutes of training

Secure Storage Controls
Course
Secure Storage Controls

Secure Storage Controls

Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.

3 videos
29 minutes of training

Securing Host Devices
Course
Securing Host Devices

Securing Host Devices

Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.

3 videos
20 minutes of training

Network Security Components
Course
Network Security Components

Network Security Components

In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.

6 videos
43 minutes of training

Technical Management Processes
Course
Technical Management Processes

Technical Management Processes

Dive deep into the technical aspects of managing systems engineering.

8 videos
107 minutes of training

System Development Methodologies
Course
System Development Methodologies

System Development Methodologies

Understand the advantages and disadvantages of different development methods.

3 videos
44 minutes of training

Acquisition Process
Course
Acquisition Process

Acquisition Process

Know what’s involved in the systems acquisition phase and how to prepare for it.

2 videos
38 minutes of training

Secure Disposal
Course
Secure Disposal

Secure Disposal

Know how to handle a system at the end of its lifecycle and the key security considerations.

2 videos
31 minutes of training

Secure Maintenance
Course
Secure Maintenance

Secure Maintenance

Learn about the three main areas of secure maintenance and related strategies.

3 videos
52 minutes of training

Secure Operations
Course
Secure Operations

Secure Operations

Understand the basics of maintaining a secure operations strategy.

4 videos
61 minutes of training

Verification and Validation of Systems or System Modifications
Course
Verification and Validation of Systems or System Modifications

Verification and Validation of Systems or System Modifications

Go through the post-deployments steps of ensuring the system is adequately secure.

2 videos
32 minutes of training

Implementation, Integration and Deployment of Systems or System Modifications
Course
Implementation, Integration and Deployment of Systems or System Modifications

Implementation, Integration and Deployment of Systems or System Modifications

Learn the basics of system implementation, integration and deployment.

1 video
16 minutes of training

System Security Architecture and Design
Course
System Security Architecture and Design

System Security Architecture and Design

Review the core components and processes of security architecture and design.

1 video
9 minutes of training

Secure Software Development
Course
Secure Software Development

Secure Software Development

Explore the ins and outs of secure software development as you progress through this nine-video course.

9 videos
45 minutes of training

Requirements Analysis
Course
Requirements Analysis

Requirements Analysis

Discover the process for analyzing requirements before designing security systems.

1 video
18 minutes of training

Secure Design Principles
Course
Secure Design Principles

Secure Design Principles

Explore the principles behind secure system design, ranging from security models to certification and accreditation.

9 videos
38 minutes of training

Operational Risk Management
Course
Operational Risk Management

Operational Risk Management

Understand how today’s complex business environment impacts operational risk and related controls.

6 videos
72 minutes of training

Risk Management Process
Course
Risk Management Process

Risk Management Process

Walk through the security risk management process and learn best practices.

9 videos
139 minutes of training

Vulnerability Management Principles
Course
Vulnerability Management Principles

Vulnerability Management Principles

Know why it’s important to manage vulnerabilities, and what the engineer’s role is.

2 videos
33 minutes of training

Disaster Recovery
Course
Disaster Recovery

Disaster Recovery

Don't let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.

6 videos
35 minutes of training

Business Continuity Planning
Course
Business Continuity Planning

Business Continuity Planning

Learn how to keep your business up and running. Explore the importance of continuity planning, incident response planning and impact analysis.

3 videos
20 minutes of training

System Resilience Principles
Course
System Resilience Principles

System Resilience Principles

Dive into defense-in-depth and other principles and methods of making your systems resilient.

2 videos
27 minutes of training

Risk Management Principles
Course
Risk Management Principles

Risk Management Principles

Get a basic understanding or risk management in an organization.

1 video
16 minutes of training

General Security Principles
Course
General Security Principles

General Security Principles

Review the security principles that security engineers need to know in order to implement systems.

4 videos
60 minutes of training

Distributed System & Virtualized Networks
Course
Distributed System & Virtualized Networks

Distributed System & Virtualized Networks

Explore the use of distributed and virtualized systems as well as the security benefits and potential drawbacks involved in their use.

4 videos
20 minutes of training

Secure Network Design
Course
Secure Network Design

Secure Network Design

Explore key concepts behind secure network design, including tools to keep threats out and techniques to detect and deflect intruders that breach your defenses.

6 videos
26 minutes of training

WAN & Remote Access Security
Course
WAN & Remote Access Security

WAN & Remote Access Security

Learn about securing wide area networks (WAN) and remote access against different types of cyber threats in this five-video course.

5 videos
35 minutes of training

Data Center Security
Course
Data Center Security

Data Center Security

Don't let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.

4 videos
22 minutes of training

Physical Security
Course
Physical Security

Physical Security

Don't forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.

8 videos
52 minutes of training

System Protection Mechanisms
Course
System Protection Mechanisms

System Protection Mechanisms

Learn about different system protection mechanisms and common issues such as Web-based vulnerabilities, architecture flaws and more.

7 videos
33 minutes of training

 

What you’ll learn.

  • Identifying security gaps and implementing controls
  • Technical management processes and tools
  • Acquiring and maintaining systems
  • Designing systems and implementing protection mechanisms
  • Agile and other development methodologies
  • Secure software design
  • vulnerability and risk management
  • Understanding stakeholders and business objectives

Who is this for?

At least two to three years of information security experience and a thorough understanding of networking and security concepts are recommended.

This skill path is designed for:

  • System engineers 
  • Security architects
  • Chief information security officers
  • Business analysts
  • Cybersecurity consultants
  • Anyone with a desire to build their security engineering skills

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

Plans and pricing

Personal

$299

Annually

Teams

$599 / license

Annually. Includes all content plus team admin and reporting.