Security Solutions for Infrastructure Management for CompTIA CySA+
By using established secure network architecture patterns in the design, and then following best practices to configure each component that you plug in to the overall systems, you reduce your overall vulnerabilities significantly. This course will teach you’ll analyze issues with these mechanisms and select available solutions.
What you'll learn
Weaknesses in an infrastructure’s authentication and hardware can make or break your security profile.
In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you’ll learn to evaluate your infrastructure for any flaws that attackers might leverage against you.
First, you’ll explore the concept of identities and how they’re used throughout your organization.
Next, you’ll discover how to manage your certificates to ensure that traffic and data is secure at rest and while in motion.
Finally, you’ll learn how to utilize some of the industries best practices when it comes to hardware assurance.
When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate any weaknesses in your infrastructure.
Table of contents
Course FAQ
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Also known as “white hats,” ethical hackers are security experts that perform these assessments.
Cybersecurity architecture, also known as “network security architecture”, is a framework that specifies the organizational structure, standards, policies and functional behavior of a computer network, including both security and network features.
An activity to ensure a level of confidence that microelectronics (also known as microcircuits, semiconductors, and integrated circuits, including its embedded software and/or intellectual property) function as intended and are free of known vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system's hardware and/or its embedded software and/or intellectual property, throughout the life cycle.
You can continue learning by diving into some of our other exciting cybersecurity related courses, like our Ethical Hacking series or PenTest+, or any of our cybersecurity courses that are done by some of the industry's best known cybersecurity folks.