Companies Home Search Profile

Secure Systems Design and Architecture Online Training

Focused View

Keith Barker

14:40:24

151 View
  • 1. Security Concepts for the Enterprise.mp4
    00:36
  • 2. Configuration management.mp4
    05:13
  • 3. Data protection .mp4
    05:06
  • 4. Hashing .mp4
    10:25
  • 5. Deception and Disruption.mp4
    06:24
  • 6. SSLTLS Inspection .mp4
    04:33
  • 7. Site Resiliency .mp4
    03:26
  • 8. API Considerations .mp4
    04:16
  • 9. Quiz and Review .mp4
    04:57
  • 10. Introduction to Cloud Computing and Virtualization.mp4
    00:44
  • 11. Virtualization Overview .mp4
    06:46
  • 12. Cloud Models .mp4
    04:22
  • 13. MSPs and MSSPs .mp4
    04:42
  • 14. Desktop Virtualization .mp4
    05:40
  • 15. Deploy a VM .mp4
    07:01
  • 16. Modifying a VM .mp4
    08:34
  • 17. Containers and Microservices .mp4
    03:29
  • 18. Infrastructure as Code and SDN .mp4
    04:14
  • 19. Quiz and Review .mp4
    05:29
  • 20. Intro to App Development, Deployment, and Automation.mp4
    01:00
  • 21. Development Environments .mp4
    08:27
  • 22. Separation of Duties .mp4
    05:52
  • 23. Secure Coding Techniques - Secure Design and Architecture Fundamentals for Enterprise Environments CBT Nuggets.mp4
    09:32
  • 24. OWASP BWA .mp4
    08:29
  • 25. Automation and Scripting .mp4
    04:19
  • 26. Improving Integrity .mp4
    03:08
  • 27. Review Quiz .mp4
    05:56
  • 28. Intro to Authentication and Authorization Concepts - Secure Design and Architecture Fundamentals for Enterprise Envi.mp4
    00:49
  • 29. AAA Overview.mp4
    05:58
  • 30. Authentication Methods .mp4
    14:35
  • 31. Biometrics .mp4
    04:09
  • 32. Multifactor Authentication (MFA).mp4
    07:30
  • 33. Quiz Review .mp4
    11:47
  • 34. Intro to Cybersecurity Resilience.mp4
    00:45
  • 35. Backups Overview .mp4
    06:21
  • 36. Classic Backup Types .mp4
    06:12
  • 37. Snapshots .mp4
    04:55
  • 38. Redundancy .mp4
    04:49
  • 39. RAID .mp4
    08:56
  • 40. High Availability .mp4
    05:10
  • 41. Non-Persistence .mp4
    03:33
  • 42. Diversity .mp4
    04:15
  • 43. Review Quiz .mp4
    09:11
  • 44. Intro to Security for Embedded And Specialized Systems - Secure Design and Architecture Fundamentals for Enterprise En-1.mp4
    00:56
  • 45. Embedded Systems .mp4
    03:54
  • 46. SCADA and ICS .mp4
    05:34
  • 47. Internet of Things (IoT) .mp4
    09:09
  • 48. IoT Security Risks .mp4
    06:49
  • 49. Critical Systems .mp4
    09:07
  • 50. System on a Chip (SoC) .mp4
    02:42
  • 51. Embedded System Considerations .mp4
    07:06
  • 52. Quiz and Review - Secure Design and Architecture Fundamentals for Enterprise Environments CBT Nuggets.mp4
    03:22
  • 53. Intro to Physical Security Controls - Secure Design and Architecture Fundamentals for Enterprise Environments CBT Nu-1.mp4
    00:37
  • 54. Perimeter Physical Security .mp4
    05:41
  • 55. Internal Physical Security .mp4
    06:38
  • 56. Equipment Physical Security .mp4
    02:48
  • 57. Infrastructure Controls .mp4
    05:31
  • 58. Bonus Chat on Physical Security.mp4
    14:36
  • 59. Fire suppression .mp4
    03:35
  • 60. Secure Data Destruction .mp4
    05:28
  • 61. Quiz Review .mp4
    05:37
  • 62. Intro to Cryptography Fundamentals.mp4
    00:27
  • 63. Cryptography Overview .mp4
    08:03
  • 64. Symmetric Encryption .mp4
    04:59
  • 65. Asymmetric Encryption .mp4
    07:34
  • 66. Hashing .mp4
    04:25
  • 67. Key Exchange .mp4
    05:55
  • 68. Digital Signatures .mp4
    05:27
  • 69. Hiding Data with Steganography .mp4
    04:11
  • 70. Crypto Considerations .mp4
    03:02
  • 71. Quiz And Review .mp4
    07:02
  • 72. DoS Protection, Load Balancers and Proxies.mp4
    16:33
  • 73. Intrusion PreventionDetection Systems.mp4
    12:39
  • 74. Application Security .mp4
    04:41
  • 75. NACs and VPNs .mp4
    07:03
  • 76. Securing DNS and Email .mp4
    10:16
  • 77. Routers and NAT Gateways.mp4
    07:44
  • 78. Firewalls, UTMs and NGFWs .mp4
    11:58
  • 79. Traffic Monitoring .mp4
    07:50
  • 80. Security Sensors .mp4
    15:11
  • 81. Network Segmentation .mp4
    15:11
  • 82. Deperimeterization Zero Trust .mp4
    03:35
  • 83. Merging Networks .mp4
    07:28
  • 84. Defense In Depth .mp4
    03:53
  • 85. Software Defined Networking (SDN).mp4
    09:25
  • 86. Scalability and Automation .mp4
    09:55
  • 87. Resiliency In Infrastructure Design.mp4
    15:00
  • 88. Virtuailzation and Containerization.mp4
    17:00
  • 89. CDNs and Caching .mp4
    06:44
  • 90. Baselines and Templates .mp4
    07:56
  • 91. APIs and Middleware .mp4
    13:18
  • 92. Software Assurance .mp4
    11:02
  • 93. Integrating Enterprise Applications.mp4
    06:29
  • 94. Application Development Security.mp4
    09:48
  • 95. Web Application Security .mp4
    06:44
  • 96. Data Loss Prevention and Detection.mp4
    05:41
  • 97. Data Classification, Labeling and Tagging - Secure Design and Architecture Fundamentals for Enterprise Environments -1.mp4
    07:20
  • 98. Obfuscation and Anonymization of Data.mp4
    07:17
  • 99. Data Lifecycle Management .mp4
    12:39
  • 100. Data Inventory and Mapping .mp4
    06:43
  • 101. Data Integrity Management .mp4
    13:34
  • 102. Managing Credentials .mp4
    09:47
  • 103. Password Policies .mp4
    11:30
  • 104. Access Control .mp4
    07:00
  • 105. AAA Protocols .mp4
    13:05
  • 106. MFA, OTP and SSO .mp4
    05:03
  • 107. Authenticating Hardware and People.mp4
    05:17
  • 108. Virtualization Technologies .mp4
    08:17
  • 109. Virtualization Strategies .mp4
    09:17
  • 110. Cloud Deployment Models .mp4
    08:57
  • 111. Cloud Computing Characteristics.mp4
    08:06
  • 112. Cloud Provider Limitations .mp4
    09:42
  • 113. Extending On-premise Security Controls.mp4
    08:51
  • 114. The CIA Triad .mp4
    07:23
  • 115. Non-repudiation and Compliance Requirements.mp4
    10:13
  • 116. Cryptography and PKI .mp4
    07:10
  • 117. Hashes and Digital Signatures .mp4
    10:24
  • 118. Cryptography Use Cases .mp4
    10:06
  • 119. AI and ML .mp4
    05:23
  • 120. Quantum Computing and Nano Technology.mp4
    06:04
  • 121. Homomorphic Encryption and SMC .mp4
    07:34
  • 122. Blockchain and Distributed Consensus.mp4
    07:43
  • 123. Big Data and Passwordless .mp4
    08:11
  • 124. Virtual Reality and 3D Printing.mp4
    07:08
  • 125. Deepfakes and Biometric Impersonation.mp4
    05:46
  • Description


    This entry-level Secure Systems Design and Architecture training prepares learners to design and plan an enterprise network that incorporates cutting-edge security technologies, tools and concepts into the physical and digital architecture.

    Keeping a network of any size secure takes foresight and planning. But as the size of the network expands, that foresight and planning expands at a faster rate. Once you hit enterprise-scale networks, the rules of how to plan a secure design look familiar but are much more complex than the rules for small, local networks.

    More details


    This Secure Systems Design and Architecture training explains the security tools, technologies and concepts that a network engineer must be familiar with before setting out to design an enterprise network's architecture. From physical to digital, cloud to on-prem, learn the fundamentals of keeping an enterprise secure with this training.

    For anyone who manages their security training, this security training can be used to onboard new network engineers, curated into individual or team training plans, or as a network security reference resource.

    Secure Systems Design and Architecture: What You Need to Know

    This Secure Systems Design and Architecture training has videos that cover topics including:

    • Providing managed virtualization and cloud compute solutions
    • Managing secure application development, deployment and automation
    • Designing and implementing authentication and authorization technologies
    • Planning and implementing cybersecurity resilience strategies
    • Understanding physical security, cryptographic and embedded system concepts

    Who Should Take Secure Systems Design and Architecture Training?

    This Secure Systems Design and Architecture training is considered professional-level security training, which means it was designed for network engineers. This security network design skills course is designed for network engineers with three to five years of experience with network design principles.

    New or aspiring network engineers. If you're a brand new network engineer, you have a career ahead of you of trying to balance speed, availability, cost and security requirements with your enterprise network designs. With this Secure Systems Design and Architecture training, you'll learn what security fundamentals you should start with and make sure are incorporated with all the other requirements you'll have to plan for and accommodate in your network designs.

    Experienced network engineers. This Secure Systems Design and Architecture training is ideal for network engineers who've been working for several years already but haven't had to focus on security concepts or technologies so far. If your career has focused on compute, storage or delivery concepts at the enterprise level, this training can show you how enterprise-level security concepts can get woven in with what you already know.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 125
    • duration 14:40:24
    • Release Date 2023/07/22