Information Security: Hardened Security Topologies

IT Security    |    Beginner
  • 8 videos | 42m 36s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 13 users Rating 4.5 of 13 users (13)
In this 8-video course, learners will discover the key concepts of different security topologies and the key role they play in network security. Begin with an introduction to security topologies, which define the network design based on security requirements. You will then explore the design goals for security topology, the elements used to ensure that the information is secure, which means that you need the concepts of confidentiality, integrity, and availability (CIA), of information in a proper way, and it needs to be secured. You also need to practice accountability along with CIA concepts. Next, you will examine advantages and disadvantages of different security topologies, which are the Intranet, the Internet, and various other topologies. You will take a look at the impact of integrating cloud topologies, and also delve into the various layers of security in cloud computing. The final tutorial in this course explores the different methods used to harden the components of security topologies.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    Define security topologies
    Describe the elements used in designing goals of a security topology
    List the advantages and disadvantages of different security topologies
  • Describe the impact of integrating cloud topologies
    List the various layers of security in cloud computing
    Name the different methods used to harden security topologies
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 34s
  • 2m
    In this video, you will learn how to define security architectures. FREE ACCESS
  • Locked
    3.  Designing Goals for Security Topology
    2m 7s
    After completing this video, you will be able to describe the elements used in designing the goals of a security topology. FREE ACCESS
  • Locked
    4.  Advantages and Disadvantages of Security Topologies
    18m 37s
    Upon completion of this video, you will be able to list the advantages and disadvantages of different security architectures. FREE ACCESS
  • Locked
    5.  Impact of Integrating Cloud Topologies
    5m 36s
    After completing this video, you will be able to describe the impact of integrating cloud architectures. FREE ACCESS
  • Locked
    6.  Layers of Security in Cloud Computing
    5m 54s
    Upon completion of this video, you will be able to list the various layers of security in cloud computing. FREE ACCESS
  • Locked
    7.  Methods to Harden Security Topologies
    6m 3s
    Upon completion of this video, you will be able to name the different methods used to harden security topologies. FREE ACCESS
  • Locked
    8.  Course Summary
    45s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 60 users Rating 4.4 of 60 users (60)
Rating 4.4 of 197 users Rating 4.4 of 197 users (197)
Rating 4.9 of 9 users Rating 4.9 of 9 users (9)