Implementation of Secure Solutions for CompTIA Security+
Course info



Course info



Description
In this course, you’ll learn about the various ways you can secure your company’s systems, network and data using secure protocols, hardware and software. First, you’ll learn about secure protocols and their various use cases. Next, you’ll learn about the hardware that helps harden a company’s security posture including endpoint protection, encryption mechanisms, database and application security, and network access control. Next, you’ll learn about securing WiFi and mobile solutions, along with protecting data in the cloud. Lastly, you’ll learn about authentication and public key infrastructure. When you’ve finished the course, you’ll have the knowledge necessary to pass the Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
Section Introduction Transcripts
Course Overview
Hey, everyone. My name is Christopher Rees, and welcome to my course, Implementation of Secure Solutions for CompTIA Security+. I'm both a Pluralsight author and also a senior IT OPs leader with over 20 years of enterprise IT experience that spans creating training and teaching students around the world and managing teams of enterprise engineers. Prior to my career and IT, I was in law enforcement, specializing in computer crime investigations. When it comes to security, Security+ is one of the premier certifications for those who are entering or advancing their careers in cybersecurity. Whether your role was in the public sector, the private sector, military, or federal government, understanding how to implement secure solutions is critical to defending against attacks both internal and external, on prem and also in the cloud. In this course, we're going to cover the critical elements associated with implementing secure solutions regardless of industry or location. Some of the major topics that we'll cover include implementing secure communications, protocols, and technologies, hardening infrastructure, applications, and services, secure networking solutions for wired, wireless, and also mobile communication, securing assets in the cloud, and then secure authentication, authorization, and access control including public key infrastructure. By the end of this course, you'll have a good understanding of the skills, the tools, and the knowledge required to assess and mitigate risks and implement secure solutions throughout your organization, as well as being able to articulate those risks to management and partner organizations. Before beginning this course, you should be familiar with general IT and cybersecurity concepts. I hope you'll join me on this journey to learn more about implementing secure solutions for your company as we dig into the Implementation of Secure Solutions for CompTIA Security+ here, at Pluralsight.