Security Solutions for Infrastructure Management for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
By using established secure network architecture patterns in the design, and then following best practices to configure each component that you plug in to the overall systems, you reduce your overall vulnerabilities significantly. This course will teach you’ll analyze issues with these mechanisms and select available solutions.
Weaknesses in an infrastructure’s authentication and hardware can make or break your security profile. In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you’ll learn to evaluate your infrastructure for any flaws that attackers might leverage against you. First, you’ll explore the concept of identities and how they’re used throughout your organization. Next, you’ll discover how to manage your certificates to ensure that traffic and data is secure at rest and while in motion. Finally, you’ll learn how to utilize some of the industries best practices when it comes to hardware assurance. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate any weaknesses in your infrastructure.
Weaknesses in an infrastructure’s authentication and hardware can make or break your security profile. In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you’ll learn to evaluate your infrastructure for any flaws that attackers might leverage against you. First, you’ll explore the concept of identities and how they’re used throughout your organization. Next, you’ll discover how to manage your certificates to ensure that traffic and data is secure at rest and while in motion. Finally, you’ll learn how to utilize some of the industries best practices when it comes to hardware assurance. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate any weaknesses in your infrastructure.
Taught by
Dale Meredith
Related Courses
Systems & Network SecurityChaffey College via California Community Colleges System Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX Developing Secure IoT Applications
EDUCBA via Coursera Essential Aspects of Software, Hardware, and Data Backup
Microsoft via Coursera Cybersecurity
University of Maryland, College Park via Coursera