Simple play icon Course

Security Solutions for Infrastructure Management for CompTIA CySA+

by Dale Meredith

By using established secure network architecture patterns in the design, and then following best practices to configure each component that you plug in to the overall systems, you reduce your overall vulnerabilities significantly. This course will teach you’ll analyze issues with these mechanisms and select available solutions.

What you'll learn

Weaknesses in an infrastructure’s authentication and hardware can make or break your security profile.

In this course, Security Solutions for Infrastructure Management for CompTIA CySA+, you’ll learn to evaluate your infrastructure for any flaws that attackers might leverage against you.

First, you’ll explore the concept of identities and how they’re used throughout your organization.

Next, you’ll discover how to manage your certificates to ensure that traffic and data is secure at rest and while in motion.

Finally, you’ll learn how to utilize some of the industries best practices when it comes to hardware assurance.

When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate any weaknesses in your infrastructure.

Course FAQ

What is Comptia Cysa+?

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

What is the meaning of ethical hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Also known as “white hats,” ethical hackers are security experts that perform these assessments.

What is network security architecture?

Cybersecurity architecture, also known as “network security architecture”, is a framework that specifies the organizational structure, standards, policies and functional behavior of a computer network, including both security and network features.

What is hardware assurance?

An activity to ensure a level of confidence that microelectronics (also known as microcircuits, semiconductors, and integrated circuits, including its embedded software and/or intellectual property) function as intended and are free of known vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system's hardware and/or its embedded software and/or intellectual property, throughout the life cycle.

What courses should I take after this one?

You can continue learning by diving into some of our other exciting cybersecurity related courses, like our Ethical Hacking series or PenTest+, or any of our cybersecurity courses that are done by some of the industry's best known cybersecurity folks.

About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowl... more

Ready to upskill? Get started