- Course
- Security
Architecture and Design for CompTIA Security+
This course will teach you the fundamentals and key concepts around the security architecture and design, and how your organization implements and utilizes various tools and technologies to secure the environment.
What you'll learn
In this course, you’ll learn about the tools and technologies used to secure the environment. First you’ll learn various methods to ensure data is secure, changes are tracked, and disruptions are minimized. Next, you’ll learn how virtualization and cloud computing can be leverage securely to enhance both productivity and security. Then, you'll learn about automation, resiliency, and failover to strengthen your company’s security posture. Lastly, you’ll dive into the basics of cryptographic concepts to ensure data is secure at-rest, in-transit and in-use. When you’ve finished this courses, you’ll have the knowledge required to pass the architecture and design section of Security+, along with the skills needed to help ensure your companies critical data and assets are secure from attacks both internal and external.
Table of contents
- Module Intro | 1m 31s
- Configuration Management | 3m 43s
- Diagrams | 1m 9s
- Baseline Configuration | 1m 59s
- IP Address Schema | 2m 16s
- Data Sovereignty | 1m 28s
- Data Loss Prevention (DLP) | 2m 26s
- Types of Data to Secure | 1m 21s
- Data Masking | 4m 19s
- Tokenization | 2m 17s
- Digital Rights Management (DRM) | 1m 1s
- Hardware Based Encryption (TPM and HSM) | 1m 27s
- Geographical Considerations | 1m 30s
- Cloud Access Security Broker (CASB) | 1m 6s
- Security-as-a-Service (SECaaS) | 1m 5s
- Differences between CASB and SECaaS | 1m 6s
- Recovery | 1m 33s
- Secure Protocols and SSL/TLS Inspection | 1m 39s
- Hashing | 1m 44s
- API Considerations and API Gateways | 2m 10s
- Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites) | 2m 59s
- Disaster Area Example | 1m 40s
- Honeypots and Honeyfiles | 59s
- Honeynets | 59s
- Fake Telemetry | 1m 15s
- DNS Sinkhole | 1m 57s
About the author
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.