-67%

Secure Systems Design and Architecture Course

$15.00

Price: 15.00 USD | Size: 8.60 GB | ?Duration : 14.41 Hours??| 125 Video Lessons | Bonus : Secure Architecture Design PDF Guides??

BRAND:

ENGLISH | INSTANT DOWNLOAD |????????????4.9

OR

Description

Price: 15.00 USD | Size: 8.60 GB | ?Duration : 14.41 Hours??| 125 Video Lessons | Bonus : Secure Architecture Design PDF Guides??

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD |????????????4.9

Secure Systems Design and Architecture Online Training

This entry-level Secure Systems Design and Architecture training prepares learners to design and plan an enterprise network that incorporates cutting-edge security technologies, tools and concepts into the physical and digital architecture.

Keeping a network of any size secure takes foresight and planning. But as the size of the network expands, that foresight and planning expands at a faster rate. Once you hit enterprise-scale networks, the rules of how to plan a secure design look familiar but are much more complex than the rules for small, local networks.

This Secure Systems Design and Architecture training explains the security tools, technologies and concepts that a network engineer must be familiar with before setting out to design an enterprise network’s architecture. From physical to digital, cloud to on-prem, learn the fundamentals of keeping an enterprise secure with this training.

For anyone who manages their security training, this security training can be used to onboard new network engineers, curated into individual or team training plans, or as a network security reference resource.

Secure Systems Design and Architecture: What You Need to Know

This Secure Systems Design and Architecture training has videos that cover topics including:

  • Providing managed virtualization and cloud compute solutions
  • Managing secure application development, deployment and automation
  • Designing and implementing authentication and authorization technologies
  • Planning and implementing cybersecurity resilience strategies
  • Understanding physical security, cryptographic and embedded system concepts

Who Should Take Secure Systems Design and Architecture Training?

This Secure Systems Design and Architecture training is considered professional-level security training, which means it was designed for network engineers. This security network design skills course is designed for network engineers with three to five years of experience with network design principles.

New or aspiring network engineers.?If you’re a brand new network engineer, you have a career ahead of you of trying to balance speed, availability, cost and security requirements with your enterprise network designs. With this Secure Systems Design and Architecture training, you’ll learn what security fundamentals you should start with and make sure are incorporated with all the other requirements you’ll have to plan for and accommodate in your network designs.

Experienced network engineers.?This Secure Systems Design and Architecture training is ideal for network engineers who’ve been working for several years already but haven’t had to focus on security concepts or technologies so far. If your career has focused on compute, storage or delivery concepts at the enterprise level, this training can show you how enterprise-level security concepts can get woven in with what you already know.

 

Security Concepts for the Enterprise
1. Introduction to Security Concepts for the Enterprise
1 min
2. Configuration management
5 mins
3. Data protection
5 mins
4. Hashing
10 mins
5. Deception and Disruption
6 mins
6. SSL/TLS Inspection
4 mins
7. Site Resiliency
3 mins
8. API Considerations
4 mins
9. Quiz and Review
4 mins

Cloud Computing and Virtualization
1. Introduction to Cloud Computing and Virtualization
1 min
2. Virtualization Overview
6 mins
3. Cloud Models
4 mins
4. MSPs and MSSPs
4 mins
5. Desktop Virtualization
5 mins
6. Deploy a VM
7 mins
7. Modifying a VM
8 mins
8. Containers and Microservices
3 mins
9. Infrastructure as Code and SDN
4 mins
10. Quiz and Review
5 mins

Summarize App Development, Deployment, and Automation
1. Intro to App Development, Deployment, and Automation
1 min
2. Development Environments
8 mins
3. Separation of Duties
5 mins
4. Secure Coding Techniques
9 mins
5. OWASP BWA
8 mins
6. Automation and Scripting
4 mins
7. Improving Integrity
3 mins
8. Review Quiz
5 mins

Authentication and Authorization Design Concepts
1. Intro to Authentication and Authorization Concepts
1 min
2. AAA Overview
5 mins
3. Authentication Methods
14 mins
4. Biometrics
4 mins
5. Multifactor Authentication (MFA)
7 mins
6. Quiz Review
11 mins

Cybersecurity Resilience
1. Intro to Cybersecurity Resilience
1 min
2. Backups Overview
6 mins
3. Classic Backup Types
6 mins
4. Snapshots
4 mins
5. Redundancy
4 mins
6. RAID
8 mins
7. High Availability
5 mins
8. Non-Persistence
3 mins
9. Diversity
4 mins
10. Review Quiz
9 mins

Security for Embedded and Specialized Systems
1. Intro to Security for Embedded & Specialized Systems
1 min
2. Embedded Systems
3 mins
3. SCADA and ICS
5 mins
4. Internet of Things (IoT)
9 mins
5. IoT Security Risks
6 mins
6. Critical Systems
9 mins
7. System on a Chip (SoC)
2 mins
8. Embedded System Considerations
7 mins
9. Quiz and Review
3 mins

Physical Security Controls
1. Intro to Physical Security Controls
1 min
2. Perimeter Physical Security
5 mins
3. Internal Physical Security
6 mins
4. Equipment Physical Security
2 mins
5. Infrastructure Controls
5 mins
6. Bonus Chat on Physical Security
14 mins
7. Fire suppression
3 mins
8. Secure Data Destruction
5 mins
9. Quiz / Review
5 mins

Cryptography Fundamentals
1. Intro to Cryptography Fundamentals
1 min
2. Cryptography Overview
8 mins
3. Symmetric Encryption
4 mins
4. Asymmetric Encryption
7 mins
5. Hashing
4 mins
6. Key Exchange
5 mins
7. Digital Signatures
5 mins
8. Hiding Data with Steganography
4 mins
9. Crypto Considerations
3 mins
10. Quiz & Review
7 mins

Secure Network Architecture Services
1. DoS Protection, Load Balancers and Proxies
16 mins
2. Intrusion Prevention/Detection Systems
12 mins
3. Application Security
4 mins
4. NACs and VPNs
7 mins
5. Securing DNS and Email
10 mins
6. Routers and NAT Gateways
7 mins
7. Firewalls, UTMs and NGFWs
11 mins

Secure Network Architecture Practices
1. Traffic Monitoring
7 mins
2. Security Sensors
15 mins
3. Network Segmentation
15 mins
4. Deperimeterization / Zero Trust
3 mins
5. Merging Networks
7 mins
6. Defense In Depth
3 mins

Security Infrastructure Design
1. Software Defined Networking (SDN)
9 mins
2. Scalability and Automation
9 mins
3. Resiliency In Infrastructure Design
15 mins
4. Virtuailzation and Containerization
17 mins
5. CDNs and Caching
6 mins

Secure Software Integration
1. Baselines and Templates
7 mins
2. APIs and Middleware
13 mins
3. Software Assurance
11 mins
4. Integrating Enterprise Applications
6 mins
5. Application Development Security
9 mins
6. Web Application Security
6 mins

Data Security Techniques
1. Data Loss Prevention and Detection
5 mins
2. Data Classification, Labeling and Tagging
7 mins
3. Obfuscation and Anonymization of Data
7 mins
4. Data Lifecycle Management
12 mins
5. Data Inventory and Mapping
6 mins
6. Data Integrity Management
13 mins

Authentication and Authorization Controls
1. Managing Credentials
9 mins
2. Password Policies
11 mins
3. Access Control
7 mins
4. AAA Protocols
13 mins
5. MFA, OTP and SSO
5 mins
6. Authenticating Hardware and People
5 mins

Cloud and Virtualization Solutions
1. Virtualization Technologies
8 mins
2. Virtualization Strategies
9 mins
3. Cloud Deployment Models
8 mins
4. Cloud Computing Characteristics
8 mins
5. Cloud Provider Limitations
9 mins
6. Extending On-premise Security Controls
8 mins

Cryptography and PKI
1. The CIA Triad
7 mins
2. Non-repudiation and Compliance Requirements
10 mins
3. Cryptography and PKI
7 mins
4. Hashes and Digital Signatures
10 mins
5. Cryptography Use Cases
10 mins

Enterprise Security and Emerging Technologies
1. AI and ML
5 mins
2. Quantum Computing and Nano Technology
6 mins
3. Homomorphic Encryption and SMC
7 mins
4. Blockchain and Distributed Consensus
7 mins
5. Big Data and Passwordless
8 mins
6. Virtual Reality and 3D Printing
7 mins
7. Deepfakes and Biometric Impersonation
5 mins

 

Bonus : Secure Architecture Design PDF Guides??

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…

Quick Navigation
×

Cart