Security Architecture for CompTIA Security+
This course will teach you the essential concepts necessary to understand the key elements of proper security architecture and the reasons why they’re important both for real world implementation and the Security+ exam.
What you'll learn
A successful career in cyber security is built upon a strong foundation of security concepts, platforms and elements that go into designing a secure environment. In this course, Security Architecture, you will learn how to identify current and future platforms and controls within your company and strengthen their security posture. Next, you’ll learn to apply those principles when designing for the environment, along with the various types of vulnerabilities a bad actor is likely to try and exploit. Finally, you’ll learn the different types of data that need to be safeguarded and the tools used to provide security, availability and resiliency. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.
Table of contents
- Module Intro 1m
- Why Is This Important? 1m
- Cloud Responsibility Matrix 2m
- Types of Clouds 1m
- XaaS, PaaS, IaaS, and SaaS 5m
- Infrastructure as Code and CI/CD 2m
- Serverless Computing 1m
- Microservices 4m
- Software Defined Networking (SDN) 2m
- On-prem vs. Off-prem 2m
- Virtualization 5m
- Internet of Things (IoT) 2m
- SCADA and ICS systems 7m
- Embedded Systems Overview 3m
- Embedded System Platforms and RTOS 3m
- Device Placement Considerations 2m
- Security Zones 2m
- VPN, Segmentation, and Firewalls 1m
- Failure Modes 1m
- Active vs. Passive 1m
- In-line vs. Taps, Monitoring, and Port Mirroring 4m
- Jump Servers and Proxies 2m
- Intrusion Detection Systems (NIDS and NIPS) 4m
- Load Balancer 4m
- Port Security and 802.1x Authentication 5m
- Secure Communication/Access (VPN, TLS and SSL) 6m
- Secure Access Service Edge 3m
- Why This Is Important 2m
- High Availability 2m
- Multipathing 1m
- Recovery Site Options 4m
- Vendor, Technology, Crypto, and Controls Diversity 3m
- Disaster Recovery Plan 1m
- Business Continuity and Business Resumption Plan 1m
- Incident Management Plan 1m
- Data Retention 1m
- Testing Types (Walkthroughs, Communication, Simulations, Partial, and Full) 3m
- Replication 1m
- On-prem vs. Cloud 1m
- Backup Plans and Policies 2m
- Backup Types (Full, Differential, and Incremental Backups) 2m
- Online vs. Offline Backups 1m
- Distance Considerations 1m
- Non-persistance, Snapshots, and Live Boot Media 1m
- Power Resiliency (UPS, Generators, Dual-supply, and PDUs) 1m