Security Engineering: Secure Network Implementation for CompTIA SecurityX
Offered By: Pluralsight
Course Description
Overview
Secure your network with essential skills. This course will teach you to enhance endpoint and server security, implement hardware security, protect specialized legacy systems, and apply cryptographic techniques needed for the CompTIA SecurityX exam.
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
Syllabus
- Enhancing Security of Endpoints and Servers 26mins
- Implementing Hardware Security Technologies 24mins
- Securing Specialized Legacy Systems 23mins
- Cryptographic Use Cases and Techniques 14mins
- Domain Summary 1min
Taught by
Brandon DeVault
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera