Implementation of Secure Solutions for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the fundamentals and key concepts around
secure protocols, hardware and software technologies, and various use
cases to illustrate how they function to keep a company’s assets and data
secure.
In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
secure protocols, hardware and software technologies, and various use
cases to illustrate how they function to keep a company’s assets and data
secure.
In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
Syllabus
- Course Overview 1min
- Implementing Secure Protocols 25mins
- Understanding Host or Application Security Solutions 50mins
- Implementing Secure Network Designs Part 1 44mins
- Implementing Secure Network Designs Part 2 44mins
- Installing and Configuring Wireless Security Settings 34mins
- Implementing Secure Mobile Solutions 39mins
- Applying Cybersecurity Solutions to the Cloud 34mins
- Implementing Identity and Account Management Controls 33mins
- Implementing Authentication and Authorization Solutions 38mins
- Implementing Public Key Infrastructure 28mins
Taught by
Christopher Rees
Related Courses
Systems & Network SecurityChaffey College via California Community Colleges System Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX Developing Secure IoT Applications
EDUCBA via Coursera Essential Aspects of Software, Hardware, and Data Backup
Microsoft via Coursera Cybersecurity
University of Maryland, College Park via Coursera