Security Architecture and Design: The Big Picture
Course info



Course info



Description
Every day we hear of another company that's been hacked many with millions of user records stolen, leaked to the dark web, or sold to the highest bidder. Understanding what makes an effective security posture is essential to combating this ever-changing threat.
In this course, Security Architecture and Design: The Big Picture, you'll learn the essential foundations of what makes an effective information security program along with what infrastructure and applications are required. First, you'll learn about installing and configuring network components, then you'll learn about secure protocols. Next, you'll explore implementing secure network architecture and troubleshooting common security issues. Finally, you'll discover secure systems design, application development and deployment, and physical security controls.
When you're finished this course, you'll have a good understanding of the various pieces that make up a solid security posture. Not only will you understand all major components of information security, but also how they fit together, and how to architect them according to best practices, to protect a company's data and digital assets.
Section Introduction Transcripts
Course Overview
Hey, everyone. My name is Christopher Rees and welcome to my course, Security Architecture and Design: The Big Picture. I'm a former law enforcement officer and detective who specialized in computer crimes and I've been in enterprise ops for 20+ years, leading teams of various sizes from medium-sized companies to Fortune 500 enterprises. I've been creating training since 2000 and I've had the privilege of instructing over 150, 000 students around the world. Practically every day we hear of some company that's had their networks breached and confidential data stolen. This often equates to user data, credentials, credit card information, email addresses, and so forth. These breaches are incredibly damaging to a company's reputation, user and investor confidence, and ultimately to their bottom line. So in this course we're going to cover the essentials of what you'll need to understand when it comes to properly planning, implementing, troubleshooting, and maintaining a company's information security posture. I want to make sure you have a good understanding of all these areas that you'll need to assess when fortifying a company's defenses. Some of the major topics that we'll cover will include installing and configuring network components. We'll talk about implementing secure protocols and some use cases associated with those protocols. We'll also talk about secure network architecture and discuss segmentation, isolation, virtualization, and also where to place various security devices within the network as well as software-defined networking or SDN. We'll also cover troubleshooting common security issues, implementing secure systems design, secure application development and deployment, and lastly, physical security controls. So by the end of this course you have a good understanding of the major components that make up a secure network and the essentials of what it takes to ensure a company's confidential information is protected. Before beginning this course you should be familiar with general computing and networking fundamentals. Once you finish here you should feel comfortable diving into more advanced security training with courses on Security+ or Advanced Security Practitioner, Big Picture courses like malware analysis or similar topics and web security and related topics. So I hope you will join me on this journey to learn how to protect a company's data, intellectual property and reputation with Security Architecture and Design: The Big Picture course here at Pluralsight.