YoVDO

CASP+ Cert Prep: 4 Technical Integration of Enterprise Security

Offered By: LinkedIn Learning

Tags

CompTIA CASP+ (Plus) Courses Network Security Courses Information Security Certifications Courses Application Security Courses Authorization Courses Cloud Security Courses Storage Security Courses

Course Description

Overview

Learn how to integrate various technologies into a secure enterprise architecture as you prepare for domain 4 of the CASP+ exam: Technical Integration of Enterprise Security.

Syllabus

Introduction
  • Getting ready for domain 4 of the CASP+ exam
  • What you should know
  • About the exam
1. Integrating Hosts, Storage, Networks, and Applications into the Secure Enterprise Architecture
  • Adapting data flow security to changing business needs
  • Standards
  • Interoperability issues
  • Resiliency issues
  • Data security considerations
  • Provisioning and deprovisioning resources
  • Network segmentation and delegation
  • Design considerations for mergers and acquisitions
  • Logical deployment diagrams
  • Security and privacy considerations of storage integration
  • Security implications of enterprise applications
2. Integrating the Cloud and Virtualization into the Secure Enterprise Architecture
  • Cloud considerations
  • Cloud service models
  • Virtualization security considerations
  • Augmenting security in the cloud
  • Commingling considerations
  • Data security considerations
  • Provisioning and deprovisioning resources
3. Integrating Authentication and Authorization into the Secure Enterprise Architecture
  • Authentication
  • Authorization
  • Attestation
  • Identity proofing
  • Identity propagation
  • Federated identification
  • Trust models
4. Integrating Cryptographic Techniques into the Secure Enterprise Architecture
  • Cryptographic techniques
  • Message authentication
  • Protection of data
  • Cryptographic implementations
  • Cryptographic implementation considerations
  • Stream versus block ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Public key infrastructure
  • Cryptocurrency and blockchain
  • Mobile device encryption considerations
5. Integrating Secure Communications and Collaboration Solutions into the Secure Enterprise Architecture
  • Remote access
  • Unified communication
  • Web conferencing
  • Audio and video conferencing
  • Document and storage collaboration
  • Presence, instant messaging, and email
  • Telephony and VoIP integration
  • Cloud-based collaboration
  • Social media collaboration
Conclusion
  • What next?

Taught by

Jason Dion

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity