Security Engineering: Secure Network Implementation for CompTIA SecurityX
Offered By: Pluralsight
Course Description
Overview
Secure your network with essential skills. This course will teach you to enhance endpoint and server security, implement hardware security, protect specialized legacy systems, and apply cryptographic techniques needed for the CompTIA SecurityX exam.
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
In today's digital landscape, securing networks against sophisticated threats is crucial. In this course, Security Engineering: Secure Network Implementation for CompTIA SecurityX, you’ll learn to implement comprehensive security measures for your network. First, you’ll explore how to enhance the security of endpoints and servers, including application control, event logging, and threat monitoring. Next, you’ll discover techniques for implementing robust hardware security technologies, such as secure boot and tamper detection. Finally, you’ll learn how to secure specialized legacy systems and apply appropriate cryptographic techniques. When you’re finished with this course, you’ll have the skills and knowledge of security engineering needed for the CompTIA SecurityX exam.
Syllabus
- Enhancing Security of Endpoints and Servers 26mins
- Implementing Hardware Security Technologies 24mins
- Securing Specialized Legacy Systems 23mins
- Cryptographic Use Cases and Techniques 14mins
- Domain Summary 1min
Taught by
Brandon DeVault
Related Courses
Windows 10 Security FeaturesMicrosoft via edX Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Cybersecurity Compliance Framework & System Administration
IBM via Coursera Cybersecurity Compliance and Framework
IBM via edX Securing Microsoft Azure Data Access Endpoints
Pluralsight