Security Architecture and Design: The Big Picture

Company security breaches are a daily news occurrence, and they affect companies of all sizes in every industry. This course will give you the essential foundation to design and architect a secure solution to protect a company’s data and assets.
Course info
Rating
(14)
Level
Beginner
Updated
Jun 13, 2018
Duration
4h 25m
Table of contents
Course Overview
Setting the Stage
Installing and Configuring Network Components
Implementing Secure Protocols
Implementing Secure Network Architecture
Troubleshooting Common Security Issues
Implementing Secure Systems Design
Secure Application Development and Deployment
Physical Security Controls
Description
Course info
Rating
(14)
Level
Beginner
Updated
Jun 13, 2018
Duration
4h 25m
Description

Every day we hear of another company that's been hacked many with millions of user records stolen, leaked to the dark web, or sold to the highest bidder. Understanding what makes an effective security posture is essential to combating this ever-changing threat. In this course, Security Architecture and Design: The Big Picture, you'll learn the essential foundations of what makes an effective information security program along with what infrastructure and applications are required. First, you'll learn about installing and configuring network components, then you'll learn about secure protocols. Next, you'll explore implementing secure network architecture and troubleshooting common security issues. Finally, you'll discover secure systems design, application development and deployment, and physical security controls. When you're finished this course, you'll have a good understanding of the various pieces that make up a solid security posture. Not only will you understand all major components of information security, but also how they fit together, and how to architect them according to best practices, to protect a company's data and digital assets.

About the author
About the author

Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.

More from the author
Introduction to Threat Intelligence
Beginner
1h 10m
Oct 8, 2019
More courses by Christopher Rees
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, everyone. My name is Christopher Rees and welcome to my course, Security Architecture and Design: The Big Picture. I'm a former law enforcement officer and detective who specialized in computer crimes and I've been in enterprise ops for 20+ years, leading teams of various sizes from medium-sized companies to Fortune 500 enterprises. I've been creating training since 2000 and I've had the privilege of instructing over 150, 000 students around the world. Practically every day we hear of some company that's had their networks breached and confidential data stolen. This often equates to user data, credentials, credit card information, email addresses, and so forth. These breaches are incredibly damaging to a company's reputation, user and investor confidence, and ultimately to their bottom line. So in this course we're going to cover the essentials of what you'll need to understand when it comes to properly planning, implementing, troubleshooting, and maintaining a company's information security posture. I want to make sure you have a good understanding of all these areas that you'll need to assess when fortifying a company's defenses. Some of the major topics that we'll cover will include installing and configuring network components. We'll talk about implementing secure protocols and some use cases associated with those protocols. We'll also talk about secure network architecture and discuss segmentation, isolation, virtualization, and also where to place various security devices within the network as well as software-defined networking or SDN. We'll also cover troubleshooting common security issues, implementing secure systems design, secure application development and deployment, and lastly, physical security controls. So by the end of this course you have a good understanding of the major components that make up a secure network and the essentials of what it takes to ensure a company's confidential information is protected. Before beginning this course you should be familiar with general computing and networking fundamentals. Once you finish here you should feel comfortable diving into more advanced security training with courses on Security+ or Advanced Security Practitioner, Big Picture courses like malware analysis or similar topics and web security and related topics. So I hope you will join me on this journey to learn how to protect a company's data, intellectual property and reputation with Security Architecture and Design: The Big Picture course here at Pluralsight.