This course will teach you the fundamentals and key concepts around
secure protocols, hardware and software technologies, and various use
cases to illustrate how they function to keep a company’s assets and data
In this course, you’ll learn about the various ways you can secure your
company’s systems, network and data using secure protocols, hardware
and software. First, you’ll learn about secure protocols and their various
use cases. Next, you’ll learn about the hardware that helps harden a
company’s security posture including endpoint protection, encryption
mechanisms, database and application security, and network access
control. Next, you’ll learn about securing WiFi and mobile solutions, along
with protecting data in the cloud. Lastly, you’ll learn about authentication
and public key infrastructure. When you’ve finished the course, you’ll
have the knowledge necessary to pass the
Implementation domain of the CompTIA Security+ exam as well as the skills required to secure your company’s data both on-prem and in the cloud.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Course Overview Hey, everyone. My name is Christopher Rees, and welcome to my course, Implementation of Secure Solutions for CompTIA Security+. I'm both a Pluralsight author and also a senior IT OPs leader with over 20 years of enterprise IT experience that spans creating training and teaching students around the world and managing teams of enterprise engineers. Prior to my career and IT, I was in law enforcement, specializing in computer crime investigations. When it comes to security, Security+ is one of the premier certifications for those who are entering or advancing their careers in cybersecurity. Whether your role was in the public sector, the private sector, military, or federal government, understanding how to implement secure solutions is critical to defending against attacks both internal and external, on prem and also in the cloud. In this course, we're going to cover the critical elements associated with implementing secure solutions regardless of industry or location. Some of the major topics that we'll cover include implementing secure communications, protocols, and technologies, hardening infrastructure, applications, and services, secure networking solutions for wired, wireless, and also mobile communication, securing assets in the cloud, and then secure authentication, authorization, and access control including public key infrastructure. By the end of this course, you'll have a good understanding of the skills, the tools, and the knowledge required to assess and mitigate risks and implement secure solutions throughout your organization, as well as being able to articulate those risks to management and partner organizations. Before beginning this course, you should be familiar with general IT and cybersecurity concepts. I hope you'll join me on this journey to learn more about implementing secure solutions for your company as we dig into the Implementation of Secure Solutions for CompTIA Security+ here, at Pluralsight.