Security Engineering: Secure Network Implementation for CompTIA SecurityX
Offered By: Pluralsight
Course Description
Overview
Secure your network with essential skills. This course will teach you to enhance endpoint and server security, implement hardware security, protect specialized legacy systems, and apply cryptographic techniques needed for the CompTIA SecurityX exam.
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
Syllabus
- Enhancing Security of Endpoints and Servers 26mins
- Implementing Hardware Security Technologies 24mins
- Securing Specialized Legacy Systems 23mins
- Cryptographic Use Cases and Techniques 14mins
- Domain Summary 1min
Taught by
Brandon DeVault
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity