YoVDO

Implementation of Secure Solutions for CompTIA Security+

Offered By: Pluralsight

Tags

CompTIA Security+ (Plus) Courses Information Security Certifications Courses Software Security Courses Hardware Security Courses Data Security Courses

Course Description

Overview

This course will teach you the fundamentals and key concepts around
secure protocols, hardware and software technologies, and various use
cases to illustrate how they function to keep a company’s assets and data
secure.

In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.

Syllabus

  • Course Overview 1min
  • Implementing Secure Protocols 25mins
  • Understanding Host or Application Security Solutions 50mins
  • Implementing Secure Network Designs Part 1 44mins
  • Implementing Secure Network Designs Part 2 44mins
  • Installing and Configuring Wireless Security Settings 34mins
  • Implementing Secure Mobile Solutions 39mins
  • Applying Cybersecurity Solutions to the Cloud 34mins
  • Implementing Identity and Account Management Controls 33mins
  • Implementing Authentication and Authorization Solutions 38mins
  • Implementing Public Key Infrastructure 28mins

Taught by

Christopher Rees

Related Courses

Systems & Network Security
Chaffey College via California Community Colleges System
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX
Developing Secure IoT Applications
EDUCBA via Coursera
Essential Aspects of Software, Hardware, and Data Backup
Microsoft via Coursera
Cybersecurity
University of Maryland, College Park via Coursera