Companies Home Search Profile

Architecture and Design for CompTIA Security+

Focused View

Christopher Rees

4:12:05

99 View
  • 001 - Course Overview.mp4
    01:54
  • 002 - Module Introduction.mp4
    01:32
  • 003 - Framework Types.mp4
    01:29
  • 004 - NIST Cyber-Security Framework (CSF).mp4
    01:07
  • 005 - Sarbanes-Oxley and PCI DSS.mp4
    02:48
  • 006 - NIST, SSAE=16 and AT-101.mp4
    05:23
  • 007 - FedRAMP and ISO.mp4
    02:57
  • 008 - Privacy Shield.mp4
    01:08
  • 009 - HIPPA _ HITECH and PHI.mp4
    01:07
  • 010 - Benchmarks.mp4
    01:55
  • 011 - Systems Hardening.mp4
    02:38
  • 012 - Defense-in-Depth _ Layered Security.mp4
    01:34
  • 013 - Administrative and Technical Controls.mp4
    03:46
  • 014 - Module Intro, Topology and Guest Networks.mp4
    04:20
  • 015 - Honeynets, NAT and Ad Hoc Networks.mp4
    01:53
  • 016 - Security and Segmentation Models.mp4
    02:53
  • 017 - Virtualization.mp4
    01:15
  • 018 - Air Gaps.mp4
    02:05
  • 019 - VPN and VPN Concentrators.mp4
    01:05
  • 020 - Security Device Placement.mp4
    02:28
  • 021 - Software Defined Networking (SDN).mp4
    02:40
  • 022 - Module Intro and Secure Boot.mp4
    03:14
  • 023 - Measure Launch.mp4
    00:41
  • 024 - Integrity Measurement Architecture (IMA).mp4
    00:31
  • 025 - BIOS_UEFI.mp4
    00:37
  • 026 - Data Encryption, TPM and Hardware Based Encryption.mp4
    08:03
  • 027 - Types of Data to Secure.mp4
    01:11
  • 028 - Supply Chain Security.mp4
    01:56
  • 029 - Hardware Root of Trust.mp4
    01:16
  • 030 - EMI_EMP.mp4
    01:21
  • 031 - Trusted OS.mp4
    02:43
  • 032 - Secure Systems Design.mp4
    03:11
  • 033 - Mobile Device Management and BYOD.mp4
    06:53
  • 034 - Peripheral Security.mp4
    03:03
  • 035 - Module Intro and Reasons to Securely Stage and Test.mp4
    02:44
  • 036 - SDLC.mp4
    01:27
  • 037 - Development, Test, Staging and Production Environments.mp4
    03:31
  • 038 - Environments Overview.mp4
    02:13
  • 039 - Baselines.mp4
    01:27
  • 040 - Integrity Measurement.mp4
    02:34
  • 041 - Introduction.mp4
    01:57
  • 042 - SCADA.mp4
    07:14
  • 043 - Smart Devices _ IoT.mp4
    02:12
  • 044 - HVAC.mp4
    02:29
  • 045 - SoC.mp4
    01:12
  • 046 - RTOS.mp4
    00:54
  • 047 - Printers _ MFDs.mp4
    02:05
  • 048 - Camera Systems.mp4
    01:35
  • 049 - Medical Devices.mp4
    01:04
  • 050 - Aircraft _ UAV.mp4
    01:30
  • 051 - Vehicles.mp4
    02:39
  • 052 - Introduction.mp4
    01:42
  • 053 - Agile Development Method.mp4
    01:18
  • 054 - Waterfall and Spiral Development Methods.mp4
    02:29
  • 055 - Secure Devops.mp4
    01:12
  • 056 - Security Automation.mp4
    02:33
  • 057 - Continuous Integration.mp4
    01:42
  • 058 - Baselining.mp4
    00:55
  • 059 - Immutable Systems.mp4
    00:41
  • 060 - Infrastructure as Code (IAS).mp4
    01:06
  • 061 - General Change Management.mp4
    01:48
  • 062 - Provisioning and Deprovisioning.mp4
    02:21
  • 063 - Systems Development Lifecycle (SDLC).mp4
    01:53
  • 064 - Secure Coding Techniques.mp4
    06:29
  • 065 - Code Quality and Testing.mp4
    02:48
  • 066 - Static Code Analysis.mp4
    02:10
  • 067 - Fuzzing.mp4
    03:45
  • 068 - Stress Testing, Sandboxing and Model Verification.mp4
    01:56
  • 069 - Compiled Code vs. Runtime Code.mp4
    01:31
  • 070 - Introduction.mp4
    01:02
  • 071 - Virtualization.mp4
    04:10
  • 072 - Type I, Type II and Container-based Virtualization.mp4
    05:54
  • 073 - VM Escape.mp4
    01:31
  • 074 - Privilege Elevation.mp4
    00:52
  • 075 - Live VM Migration and Security Risks.mp4
    01:37
  • 076 - Data Remnants.mp4
    01:52
  • 077 - Cloud Storage.mp4
    02:27
  • 078 - Cloud Computing, Iaas, PaaS and SaaS.mp4
    01:43
  • 079 - XaaS.mp4
    03:47
  • 080 - Infrastructure as a Service.mp4
    01:53
  • 081 - Platform as a Service.mp4
    01:13
  • 082 - Software as a Service.mp4
    00:59
  • 083 - Cloud Access Security Broker _ SECaaS.mp4
    01:00
  • 084 - Types of Clouds.mp4
    04:12
  • 085 - VDI.mp4
    03:25
  • 086 - Module Intro and Whats in it for Me.mp4
    02:15
  • 087 - Automation and Scripting.mp4
    01:43
  • 088 - Whats Involved.mp4
    01:39
  • 089 - Continuous Monitoring.mp4
    01:24
  • 090 - Templates, Recoverability, Non-Persistence and Snapshots.mp4
    02:31
  • 091 - Reducing Risk.mp4
    01:05
  • 092 - High Availability.mp4
    01:09
  • 093 - Elasticity and Scalability.mp4
    02:16
  • 094 - Redundancy.mp4
    01:37
  • 095 - Fault Tolerance.mp4
    00:50
  • 096 - RAID.mp4
    03:30
  • 097 - Introduction.mp4
    01:39
  • 098 - Proper Lighting.mp4
    01:45
  • 099 - Fencing.mp4
    01:31
  • 100 - Guards.mp4
    00:42
  • 101 - Alarms.mp4
    01:34
  • 102 - Securing Physical Assets.mp4
    01:22
  • 103 - Protected Distribution Systems (PDS).mp4
    04:02
  • 104 - Airgap Networks.mp4
    01:41
  • 105 - Hardware Locks.mp4
    00:49
  • 106 - Mantraps.mp4
    00:45
  • 107 - EMI Shielding.mp4
    02:40
  • 108 - Proximity Readers.mp4
    01:08
  • 109 - Biometrics.mp4
    00:55
  • 110 - Barricades.mp4
    01:07
  • 111 - HVAC.mp4
    01:49
  • 112 - Hot and Cold Aisles.mp4
    02:35
  • 113 - Fire Suppression.mp4
    02:54
  • 114 - Screen Filters.mp4
    00:59
  • 115 - Cameras and Video Surveillance.mp4
    01:34
  • 116 - Motion Detection _ Infrared.mp4
    00:49
  • 117 - Logs.mp4
    00:48
  • 118 - Key Management.mp4
    01:38
  • comptia-security-plus-architecture-design.zip
  • Description


    Architecture and Design are critical components to maintaining a successful security posture. This course covers the concepts you need to understand and the technologies used to create a secure environment and protect company assets.

    What You'll Learn?


      Security is the number one thing that every company needs, and with each massive breach this becomes more and more apparent. IT security is a multi-pronged approach and employs defense-in-depth principles. In this course, Architecture and Design for CompTIA Security+, you'll learn architecture and design for CompTIA Securty+. First, you'll start by learning the best practices and frameworks required for creating a secure environment. Next, you'll discover designing secure networks, honeypots, VPNs, firewalls, and various security infrastructure. Then, you'll explore the virtualization techniques, and how IaaS and PaaS, coupled with cloud technologies can increase security. Finally, you'll learn about the importance of physical security and how that can strengthen or weaken your overall security posture. By the end of this course, you'll have a better understanding of critical components to maintaining a successful security posture.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 118
    • duration 4:12:05
    • level preliminary
    • Release Date 2023/02/26