Implementation of Secure Solutions for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the fundamentals and key concepts around
secure protocols, hardware and software technologies, and various use
cases to illustrate how they function to keep a company’s assets and data
secure.
In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
secure protocols, hardware and software technologies, and various use
cases to illustrate how they function to keep a company’s assets and data
secure.
In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
Syllabus
- Course Overview 1min
- Implementing Secure Protocols 25mins
- Understanding Host or Application Security Solutions 50mins
- Implementing Secure Network Designs Part 1 44mins
- Implementing Secure Network Designs Part 2 44mins
- Installing and Configuring Wireless Security Settings 34mins
- Implementing Secure Mobile Solutions 39mins
- Applying Cybersecurity Solutions to the Cloud 34mins
- Implementing Identity and Account Management Controls 33mins
- Implementing Authentication and Authorization Solutions 38mins
- Implementing Public Key Infrastructure 28mins
Taught by
Christopher Rees
Related Courses
Administer Salesforce from Anywhere During COVID-19Salesforce via Trailhead Advanced Features with Relational Database Tables Using SQLiteStudio
Coursera Project Network via Coursera Protecting Cloud Architecture with Alibaba Cloud
Alibaba via Coursera Amazon DocumentDB Service Primer (French)
Amazon Web Services via AWS Skill Builder Amazon DocumentDB Service Primer (German)
Amazon Web Services via AWS Skill Builder