Companies Home Search Profile

Architecture and Design for CompTIA Security+

Focused View

Christopher Rees

5:39:43

132 View
  • 1. Course Overview.mp4
    01:50
  • 01. Module Intro.mp4
    01:31
  • 02. Configuration Management.mp4
    03:43
  • 03. Diagrams.mp4
    01:09
  • 04. Baseline Configuration.mp4
    01:59
  • 05. IP Address Schema.mp4
    02:16
  • 06. Data Sovereignty.mp4
    01:28
  • 07. Data Loss Prevention (DLP).mp4
    02:26
  • 08. Types of Data to Secure.mp4
    01:21
  • 09. Data Masking.mp4
    04:19
  • 10. Tokenization.mp4
    02:17
  • 11. Digital Rights Management (DRM).mp4
    01:01
  • 12. Hardware Based Encryption (TPM and HSM).mp4
    01:27
  • 13. Geographical Considerations.mp4
    01:30
  • 14. Cloud Access Security Broker (CASB).mp4
    01:06
  • 15. Security-as-a-Service (SECaaS).mp4
    01:05
  • 16. Differences between CASB and SECaaS.mp4
    01:06
  • 17. Recovery.mp4
    01:33
  • 18. Secure Protocols and SSL-TLS Inspection.mp4
    01:39
  • 19. Hashing.mp4
    01:44
  • 20. API Considerations and API Gateways.mp4
    02:10
  • 21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites).mp4
    02:59
  • 22. Disaster Area Example.mp4
    01:40
  • 23. Honeypots and Honeyfiles.mp4
    00:59
  • 24. Honeynets.mp4
    00:59
  • 25. Fake Telemetry.mp4
    01:15
  • 26. DNS Sinkhole.mp4
    01:57
  • 01. Module Intro.mp4
    00:46
  • 02. Cloud Storage.mp4
    02:22
  • 03. Cloud Computing.mp4
    01:39
  • 04. -X- as a Service.mp4
    00:37
  • 05. Infrastructure as a Service (IaaS).mp4
    01:41
  • 06. IaaS and Automation.mp4
    01:30
  • 07. Platform as a Service (PaaS).mp4
    01:50
  • 08. Software as a Service (SaaS).mp4
    01:11
  • 09. IaaS, PaaS, and SaaS Differentiators.mp4
    00:57
  • 10. Types of Clouds.mp4
    00:57
  • 11. Managed Service Providers (MSP).mp4
    04:20
  • 12. Fog Computing.mp4
    02:41
  • 13. Edge Computing.mp4
    00:31
  • 14. VDI.mp4
    04:09
  • 15. Virtualization.mp4
    04:09
  • 16. Containers.mp4
    05:53
  • 17. Microservices and APIs.mp4
    03:46
  • 18. Infrastructure as Code (IAC).mp4
    00:47
  • 19. Software Defined Networking (SDN).mp4
    00:59
  • 20. Software Defined Visibility (SDV).mp4
    00:42
  • 21. Serverless Architecture.mp4
    01:47
  • 22. IaaS, PaaS, FaaS, and SaaS Differentiators.mp4
    00:58
  • 23. Service Integrations and Resource Policies.mp4
    01:30
  • 24. Transit Gateway.mp4
    00:43
  • 25. VM Sprawl Avoidance.mp4
    01:41
  • 26. VM Escape.mp4
    01:28
  • 27. Module Review.mp4
    00:36
  • 01. Module Intro.mp4
    00:55
  • 02. Environments (Dev, Test, Staging, and Production).mp4
    03:30
  • 03. Environment Example.mp4
    02:12
  • 04. Provisioning and Deprovisioning.mp4
    02:19
  • 05. Integrity Measurement.mp4
    01:51
  • 06. Static Code Analysis.mp4
    02:08
  • 07. Secure Coding Techniques.mp4
    06:27
  • 08. Security Automation.mp4
    02:25
  • 09. Continuous Monitoring and Validation.mp4
    01:22
  • 10. Continuous Integration.mp4
    01:40
  • 11. Continuous Delivery and Continuous Development.mp4
    02:05
  • 12. OWASP.mp4
    00:34
  • 13. Software Diversity, Compiler, and Binary.mp4
    01:31
  • 14. Elasticity and Scalability.mp4
    01:07
  • 15. Version Control.mp4
    02:30
  • 01. Module Intro.mp4
    00:46
  • 02. Directory Services.mp4
    01:45
  • 03. Usernames.mp4
    00:54
  • 04. Federation.mp4
    00:58
  • 05. Transitive Trust - Authentication.mp4
    01:11
  • 06. Attestation.mp4
    00:40
  • 07. Time-Based One-Time Password (TOTP).mp4
    01:31
  • 08. HMAC-Based One-Time Password (HOTP).mp4
    00:47
  • 09. SMS Authentication.mp4
    00:56
  • 10. Tokens.mp4
    01:08
  • 11. Static Codes.mp4
    00:44
  • 12. Authentication Applications.mp4
    01:00
  • 13. Push Notifications.mp4
    00:56
  • 14. Smart Cards.mp4
    00:58
  • 15. Proximity Cards.mp4
    01:18
  • 16. Personal Identification Verification Card (PIV).mp4
    00:45
  • 17. Common Access Card.mp4
    00:44
  • 18. Biometric Factors.mp4
    01:03
  • 19. Facial Recognition.mp4
    01:31
  • 20. Vein and Gait Analysis.mp4
    01:38
  • 21. Efficacy Rates.mp4
    01:08
  • 22. Identification vs. Authentication vs. Authorization.mp4
    01:12
  • 23. Multifactor Authentication.mp4
    01:04
  • 24. Authentication Factors.mp4
    02:00
  • 25. Authorization.mp4
    00:58
  • 26. Authentication Factors.mp4
    01:06
  • 27. Authentication, Authorization, and Accounting (AAA).mp4
    00:44
  • 28. On-prem vs. Cloud Requirements.mp4
    02:35
  • 01. Module Intro.mp4
    02:13
  • 02. Geographically Disperse.mp4
    00:46
  • 03. Geographical Dispersal of Assets.mp4
    01:13
  • 04. RAID.mp4
    02:48
  • 05. Multipath.mp4
    02:06
  • 06. Load Balancer.mp4
    01:07
  • 07. Power Resiliency.mp4
    01:57
  • 08. Replication.mp4
    01:52
  • 09. On-prem vs. Cloud.mp4
    01:34
  • 10. Backup Plans - Policies.mp4
    01:04
  • 11. Backup Execution - Frequency.mp4
    01:10
  • 12. Backup Types.mp4
    03:14
  • 13. Backup Environments.mp4
    01:17
  • 14. Online vs. Offline Backups.mp4
    01:27
  • 15. Backups - Distance Considerations.mp4
    02:01
  • 16. Non-persistence, Snapshots, and Live Boot Media.mp4
    02:02
  • 17. High Availability.mp4
    02:14
  • 18. Redundancy.mp4
    01:34
  • 19. Fault Tolerant Hardware.mp4
    00:45
  • 20. Technology and Vendor Diversity.mp4
    01:34
  • 21. Crypto and Control Diversity.mp4
    02:31
  • 01. Module Intro.mp4
    01:09
  • 02. Module Goal.mp4
    01:17
  • 03. Embedded Systems.mp4
    00:54
  • 04. Embedded Systems Examples.mp4
    01:41
  • 05. SCADA - ICS.mp4
    04:11
  • 06. SCADA Security Concerns.mp4
    02:53
  • 07. Smart Devices - IoT.mp4
    02:08
  • 08. Smart Devices - IoT Weak Defaults.mp4
    01:00
  • 09. Special Purpose Devices.mp4
    01:01
  • 10. Vehicles.mp4
    01:27
  • 11. Voice over IP (VoIP).mp4
    02:09
  • 12. HVAC.mp4
    02:26
  • 13. Aircraft-UAV.mp4
    01:44
  • 14. Printers-MFDs.mp4
    02:02
  • 15. Real Time Operating Systems (RTOS).mp4
    00:50
  • 16. Surveillance Systems.mp4
    01:32
  • 17. System on a Chip (SoC).mp4
    01:09
  • 18. 5G Networks and Security Concerns.mp4
    01:31
  • 19. Narrow-band and Baseband Radio.mp4
    00:42
  • 20. Zigbee.mp4
    02:24
  • 21. Constraints.mp4
    02:24
  • 01. Module Intro.mp4
    00:46
  • 02. Barricades.mp4
    01:03
  • 03. Mantraps.mp4
    00:42
  • 04. Badges.mp4
    01:46
  • 05. Alarms.mp4
    01:30
  • 06. Lighting and Signs.mp4
    01:38
  • 07. Cameras and Video Surveillance.mp4
    01:32
  • 08. Guards.mp4
    00:40
  • 09. Robot Sentries.mp4
    01:19
  • 10. Reception.mp4
    00:44
  • 11. Two Person Integrity (TPI) - Control.mp4
    00:43
  • 12. Hardware Locks.mp4
    00:47
  • 13. Biometrics.mp4
    00:51
  • 14. Cable Locks, Safes, and Locking Cabinets.mp4
    01:19
  • 15. USB Data Blocker.mp4
    01:09
  • 16. Fencing.mp4
    01:26
  • 17. Fire Suppression.mp4
    02:51
  • 18. Motion Detection - Infrared.mp4
    00:47
  • 19. Proximity Readers.mp4
    01:07
  • 20. Drones - UAV.mp4
    00:54
  • 21. Logs.mp4
    00:46
  • 22. Air Gaps.mp4
    03:09
  • 23. Demilitarized Zone (DMZ).mp4
    04:05
  • 24. Protected Distribution System (PDS).mp4
    04:00
  • 25. Hot and Cold Aisles.mp4
    02:32
  • 26. Non-Digital and Digital Data Destruction.mp4
    01:27
  • 27. Shredding.mp4
    00:49
  • 28. Pulping and Pulverizing.mp4
    01:17
  • 29. Deguassing.mp4
    01:32
  • 30. Purging.mp4
    00:39
  • 31. Wiping.mp4
    02:30
  • 32. Module Review.mp4
    00:35
  • 01. Module Intro.mp4
    00:40
  • 02. Why You Should Care.mp4
    00:47
  • 03. Cryptographic Terminology and History.mp4
    03:31
  • 04. Vigenere Table.mp4
    03:21
  • 05. Digital Signatures.mp4
    01:24
  • 06. Key Stretching.mp4
    03:23
  • 07. Hashing.mp4
    02:11
  • 08. In-band vs. Out-of-band Key Exchange.mp4
    01:27
  • 09. Elliptic Curve Cryptography (ECC).mp4
    01:09
  • 10. Perfect Forward Secrecy.mp4
    01:08
  • 11. Quantum Communications.mp4
    03:14
  • 12. Quantum Computing.mp4
    01:16
  • 13. Post Quantum.mp4
    01:01
  • 14. Ephemeral Key.mp4
    00:41
  • 15. Cipher Modes.mp4
    00:37
  • 16. XOR Function.mp4
    01:05
  • 17. Cryptographic Methods and Design.mp4
    03:40
  • 18. Blockchain.mp4
    03:57
  • 19. Fundamental Differences and Encryption Methods.mp4
    02:23
  • 20. Session Keys.mp4
    00:53
  • 21. Asymmetric Encryption.mp4
    03:27
  • 22. Lightweight Encryption.mp4
    00:52
  • 23. Steganography.mp4
    02:13
  • 24. Homomorphic Encryption.mp4
    02:02
  • 25. Common Use Cases.mp4
    03:44
  • 26. Cipher Suites.mp4
    01:46
  • 27. Limitations.mp4
    02:24
  • 28. Random and Pseudorandom Number Generators (PRNG).mp4
    01:09
  • 29. Quantum Random Number Generators (QRNG).mp4
    01:05
  • Description


    This course will teach you the fundamentals and key concepts around the security architecture and design, and how your organization implements and utilizes various tools and technologies to secure the environment.

    What You'll Learn?


      In this course, you’ll learn about the tools and technologies used to secure the environment. First you’ll learn various methods to ensure data is secure, changes are tracked, and disruptions are minimized. Next, you’ll learn how virtualization and cloud computing can be leverage securely to enhance both productivity and security. Then, you'll learn about automation, resiliency, and failover to strengthen your company’s security posture. Lastly, you’ll dive into the basics of cryptographic concepts to ensure data is secure at-rest, in-transit and in-use. When you’ve finished this courses, you’ll have the knowledge required to pass the architecture and design section of Security+, along with the skills needed to help ensure your companies critical data and assets are secure from attacks both internal and external.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 200
    • duration 5:39:43
    • level preliminary
    • Release Date 2023/01/24