Architecture and Design for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the fundamentals and key concepts around the security architecture and design, and how your organization implements and utilizes various tools and technologies to secure the environment.
In this course, you’ll learn about the tools and technologies used to secure the environment. First you’ll learn various methods to ensure data is secure, changes are tracked, and disruptions are minimized. Next, you’ll learn how virtualization and cloud computing can be leverage securely to enhance both productivity and security. Then, you'll learn about automation, resiliency, and failover to strengthen your company’s security posture. Lastly, you’ll dive into the basics of cryptographic concepts to ensure data is secure at-rest, in-transit and in-use. When you’ve finished this courses, you’ll have the knowledge required to pass the architecture and design section of Security+, along with the skills needed to help ensure your companies critical data and assets are secure from attacks both internal and external.
In this course, you’ll learn about the tools and technologies used to secure the environment. First you’ll learn various methods to ensure data is secure, changes are tracked, and disruptions are minimized. Next, you’ll learn how virtualization and cloud computing can be leverage securely to enhance both productivity and security. Then, you'll learn about automation, resiliency, and failover to strengthen your company’s security posture. Lastly, you’ll dive into the basics of cryptographic concepts to ensure data is secure at-rest, in-transit and in-use. When you’ve finished this courses, you’ll have the knowledge required to pass the architecture and design section of Security+, along with the skills needed to help ensure your companies critical data and assets are secure from attacks both internal and external.
Syllabus
- Course Overview 1min
- Understanding Security Concepts in an Enterprise Environment 46mins
- Understanding Virtualization and Cloud Computing 50mins
- Implementing Secure Application Development, Deployment, and Automation 32mins
- Understanding Authentication and Authorizations Methods 32mins
- Implementing Cybersecurity Resilience 36mins
- Recognizing Security Implications of Embedded and Specialized Systems 36mins
- Understanding the Importance of Physical Security Controls 47mins
- Understanding the Basics of Cryptographic Concepts 56mins
Taught by
Christopher Rees
Related Courses
Advanced Operating SystemsGeorgia Institute of Technology via Udacity Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Microsoft Windows Server 2012 Fundamentals: Hyper-V
Microsoft via edX