Architecture and Design for CompTIA Security+
Architecture and Design are critical components to maintaining a successful security posture. This course covers the concepts you need to understand and the technologies used to create a secure environment and protect company assets.
What you'll learn
Security is the number one thing that every company needs, and with each massive breach this becomes more and more apparent. IT security is a multi-pronged approach and employs defense-in-depth principles. In this course, Architecture and Design for CompTIA Security+, you'll learn architecture and design for CompTIA Securty+. First, you'll start by learning the best practices and frameworks required for creating a secure environment. Next, you'll discover designing secure networks, honeypots, VPNs, firewalls, and various security infrastructure. Then, you'll explore the virtualization techniques, and how IaaS and PaaS, coupled with cloud technologies can increase security. Finally, you'll learn about the importance of physical security and how that can strengthen or weaken your overall security posture. By the end of this course, you'll have a better understanding of critical components to maintaining a successful security posture.
Table of contents
- Module Introduction 2m
- Framework Types 1m
- NIST Cyber-Security Framework (CSF) 1m
- Sarbanes-Oxley and PCI DSS 3m
- NIST, SSAE=16 and AT-101 5m
- FedRAMP and ISO 3m
- Privacy Shield 1m
- HIPPA / HITECH and PHI 1m
- Benchmarks 2m
- Systems Hardening 3m
- Defense-in-Depth / Layered Security 2m
- Administrative and Technical Controls 4m
- Module Intro and Secure Boot 3m
- Measure Launch 1m
- Integrity Measurement Architecture (IMA) 1m
- BIOS/UEFI 1m
- Data Encryption, TPM and Hardware Based Encryption 8m
- Types of Data to Secure 1m
- Supply Chain Security 2m
- Hardware Root of Trust 1m
- EMI/EMP 1m
- Trusted OS 3m
- Secure Systems Design 3m
- Mobile Device Management and BYOD 7m
- Peripheral Security 3m
- Introduction 2m
- Agile Development Method 1m
- Waterfall and Spiral Development Methods 2m
- Secure Devops 1m
- Security Automation 3m
- Continuous Integration 2m
- Baselining 1m
- Immutable Systems 1m
- Infrastructure as Code (IAC) 1m
- General Change Management 2m
- Provisioning and Deprovisioning 2m
- Systems Development Lifecycle (SDLC) 2m
- Secure Coding Techniques 6m
- Code Quality and Testing 3m
- Static Code Analysis 2m
- Fuzzing 4m
- Stress Testing, Sandboxing and Model Verification 2m
- Compiled Code vs. Runtime Code 2m
- Introduction 1m
- Virtualization 4m
- Type I, Type II and Container-based Virtualization 6m
- VM Escape 2m
- Privilege Elevation 1m
- Live VM Migration and Security Risks 2m
- Data Remnants 2m
- Cloud Storage 2m
- Cloud Computing, Iaas, PaaS and SaaS 2m
- XaaS 4m
- Infrastructure as a Service 1m
- Platform as a Service 2m
- Software as a Service 1m
- Cloud Access Security Broker / SECaaS 3m
- Types of Clouds 1m
- VDI 4m
- Introduction 2m
- Proper Lighting 2m
- Fencing 2m
- Guards 1m
- Alarms 2m
- Securing Physical Assets 1m
- Protected Distribution Systems (PDS) 4m
- Airgap Networks 2m
- Hardware Locks 1m
- Mantraps 1m
- EMI Shielding 3m
- Proximity Readers 1m
- Biometrics 1m
- Barricades 1m
- HVAC 2m
- Hot and Cold Aisles 3m
- Fire Suppression 3m
- Screen Filters 1m
- Cameras and Video Surveillance 2m
- Motion Detection / Infrared 1m
- Logs 1m
- Faraday Cage 1m
- Key Management 2m