Security Solutions for Infrastructure Management for CompTIA CySA+

By using established secure network architecture patterns in the design, and then following best practices to configure each component that you plug in to the overall systems, you reduce your overall vulnerabilities significantly. This course will teach you’ll analyze issues with these mechanisms and select available solutions.
Course info
Rating
(16)
Level
Intermediate
Updated
Oct 15, 2020
Duration
1h 20m
Table of contents
Description
Course info
Rating
(16)
Level
Intermediate
Updated
Oct 15, 2020
Duration
1h 20m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Weaknesses in an infrastructure’s authentication and hardware can make or break your security profile.

In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you’ll learn to evaluate your infrastructure for any flaws that attackers might leverage against you.

First, you’ll explore the concept of identities and how they’re used throughout your organization.

Next, you’ll discover how to manage your certificates to ensure that traffic and data is secure at rest and while in motion.

Finally, you’ll learn how to utilize some of the industries best practices when it comes to hardware assurance.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate any weaknesses in your infrastructure.

Course FAQ
Course FAQ
What is Comptia Cysa+?

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

What is the meaning of ethical hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Also known as “white hats,” ethical hackers are security experts that perform these assessments.

What is network security architecture?

Cybersecurity architecture, also known as “network security architecture”, is a framework that specifies the organizational structure, standards, policies and functional behavior of a computer network, including both security and network features.

What is hardware assurance?

An activity to ensure a level of confidence that microelectronics (also known as microcircuits, semiconductors, and integrated circuits, including its embedded software and/or intellectual property) function as intended and are free of known vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system's hardware and/or its embedded software and/or intellectual property, throughout the life cycle.

What courses should I take after this one?

You can continue learning by diving into some of our other exciting cybersecurity related courses, like our Ethical Hacking series or PenTest+, or any of our cybersecurity courses that are done by some of the industry's best known cybersecurity folks.

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
Cloud and Automation for CompTIA CySA+
Intermediate
56m
Dec 11, 2020
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, everybody. My name is Dale Meredith, and I am so excited to welcome you to my course, Security Solutions for Infrastructure Management for CompTIA CySA+. Now you may be asking yourself, exactly who is this Dale guy? Well, I've been a Microsoft Trainer since 1998, yeah, I'm an old dog, and a Certified Ethical Hacker since the early 2000s, as well as a Certified EC‑Council Trainer. I've taught audiences around the world, including universities, Inc. 500 companies, and even several US government agencies, including some of our men and women of our military, in the CompTIA courses. Now, this course is the fourth course in your journey towards CySA+ certification. In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you'll learn to evaluate your infrastructure's technologies for any flaws that attackers might leverage against you. And trust me, they will. First, you'll explore the concepts of identities and how they're used throughout your organizations and what flaws could be available. Next, you'll discover how to manage your certificates to ensure that the traffic and data is secure at rest and while in motion. Finally, you'll learn how to utilize some of the industry's best practices when it comes to hardware assurance. When you're finished with this course, you'll have the skills and knowledge of a security analyst needed to detect and mitigate any weaknesses in your infrastructure. From here. hey, you can continue learning by diving into some of our other exciting cybersecurity related courses, like our Ethical Hacking series or PenTest+, or any of our cybersecurity courses that are done by some of the industry's best known cybersecurity folks. Listen, I hope you'll join me in learning and understanding the concepts of Security Solutions for Infrastructure Management for CompTIA CySA+, here at Pluralsight.