Home Link

For Businesses

Business Services

Helping the Businesses in our Community.

Regional Services

Everything you need to know to grow in Yavapai County.

Grant Assistance

From grant research to writing services.

Data and Analytics

Research for sustainable business growth.

Quest Grant

Learn for free and earn certificates with QUEST!

About Yavapai County

Everything you need to know about commerce Yavapai County.

For Employees & Job Seekers

Career Resources

Personalized training, career counseling, scholarships, and more!

On-Demand Courses

Learn new skills and get ready for your next career move.

Job Fairs and Events

Connect with employers through local job fairs and career events.

Hot Jobs

Top Jobs, Occupations, and Skills in Yavapai County

Job Postings Data Trends

Explore the latest data on job opportunities available from local employers

Events

Loading upcoming events...

On-Demand Training

On-Demand Course Options

See and compare the different course bundles and trainings available through the REDC.

A la carte Courses

Choose your own individual courses.

Blog

Keep up with the REDC and find more education resources in our blog.

Subject Matter Expert

Train employees and businesses in leadership, professional development, communication, and more

Back to all courses

Application, Data, and Host Security Scenarios

$79
Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSP®
Application, Data, and Host Security Scenarios

Description

When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

credits

  • PMI PDUs: 5
    • Leadership PDUs: 1.5
      • Strategic & Business Management PDUs: 1
        • Technical PM PDUs: 2.5
          • IACET CEUs: 0.5
            • HRCI Credits: 5

              features

              • Mobile-friendly
              • Audio-enabled
              • Badge and credit-awarding
              • Real-world case studies
              • Fully accessible
              • Games & Flashcards
              • Expert-supported
              • Video content

              learning Outcomes

              • Discuss the role of security in software development
              • Explain the software development life cycle and compare its eight stages
              • Understand what the operating system is and how it works
              • Describe different application and operating environments
              • Discuss the role of databases and the information security challenges they raise
              • Understand the various vectors for attack
              • Explain the objectives of Trusted Recovery and the concept of system hardening
              • Recognize the need for physical security and the varying means of achieving it
              • Recognize the need for physical security and the varying means of achieving it
              • Apply security concepts to real-world scenarios highlighting the need for application, data, and host security

              related courses

              Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu

              Sign up for the REDC Newsletter

              Stay in touch with the REDC and learn how we are impacting our community!
              Contact Us