Architecture and Design

Architecture and Design

Rating
Average: 4 (3 votes)
Architecture and Design
Course
Course
Cybersecurity
Subjects
Subjects
Career & Technical Education
Cybersecurity
Robotics & Coding
Grade Levels
Grade Levels
10
11
12
Duration (hours)
Duration (Approx hours)
30
Overview
In this unit, students will work with secure network concepts and how systems are designed
Standards
CompTIA Security+ (SYO-501) Objectives 3.1 – 3.9
Cyber Connections
Threats and Vulnerabilities
Hardware and Software
Cyber Hygiene
Digital Citizenship
Networks and Internet
Section Title
Lessons
Accordion Items
Title
3.1 - Explain use cases and purpose for frameworks, best practices and secure configuration guides
Content
  • Industry-Standard Frameworks and Reference Architectures
  • Benchmarks / Secure Configuration Guides
  • Defense-in-Depth . Layered Security
Title
3.2 - Given a scenario, implement secure network architecture concepts
Content
  • Zones / Topologies
  • Segregation / Segmentation / Isolation
  • Tunneling / VPN
  • Security Device / Technology Placement
  • SDN
Title
3.3 - Given a scenario, implement secure systems design
Content
  • Hardware / Firmware Security
  • Operating Systems
  • Peripherals
Title
3.4 - Explain the importance of secure staging deployment concepts
Content
  • Sandboxing
  • Environment
  • Secure Baseline
  • Integrity Mesurement
Title
3.5 - Explain the security implications of embedded systems
Content
  • SCADA / ICS
  • Smart Devices / IoT
  • HVAC
  • SoC
  • RTOS
  • Printers . MFDs
  • Camera Systems
  • Special Purpose
Title
3.6 - Summarize secure application development and deployment concepts
Content
  • Development Life-Cycle Models
  • Secure DevOps
  • Version Control and Change Management
  • Provisioning and Deprovisioning
  • Secure Coding Technologies
  • Code Quality and Testing
  • Compiled vs. Runtime Code
Title
3.7 - Summarize cloud and virtualization concepts
Content
  • Hypervisor
  • VM Sprawl Avoidance
  • VM Escape Protection
  • Cloud Storage
  • Cloud Deployment Models
  • On-Premise vs. Hosted vs. Cloud
  • VDI / VDE
  • Cloud Access Security Broker
  • Security as a Service
Title
3.8 - Explain how resiliency and automation strategies reduce risk
Content
  • Automation / Scripting
  • Templates
  • Master Image
  • Non-Persistence
  • Elasticity
  • Scalability
  • Distributive Allocation
  • Redundancy
  • Fault Tolerance
  • High Availability
  • RAID
Title
3.9 - Explain the importance of physical security controls
Content
  • Lighting
  • Signs
  • Fencing / Gate / Cage
  • Security Guards
  • Alarms
  • Safe
  • Secure Cabinets / Enclosures
  • Protected Distribution / Protected Cabling
  • Airgap
  • Mantrap
  • Faraday Cage
  • Lock Types
  • Biometrics
  • Barricades / Bollards
  • Tokens / Cards
  • Environmental Controls
  • Cable locks
  • Screen Filters
  • Cameras
  • Motion Detection
  • Logs
  • Infrared Detection
  • Key Management